First published: Tue Feb 20 2024(Updated: )
In Liferay Portal 7.2.0 through 7.4.3.25, and older unsupported versions, and Liferay DXP 7.4 before update 26, 7.3 before update 5, 7.2 before fix pack 19, and older unsupported versions the default value of the portal property `http.header.version.verbosity` is set to `full`, which allows remote attackers to easily identify the version of the application that is running and the vulnerabilities that affect that version via 'Liferay-Portal` response header.
Credit: security@liferay.com
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay 7.4 GA | >=7.2.0<7.4.3.25>older unsupported versions | |
Liferay 7.4 GA | <7.4.26<7.3.5<7.2.19>older unsupported versions | |
Liferay 7.4 GA | <=7.3.7 | |
Liferay 7.4 GA | >=7.4.0<7.4.3.26 | |
Liferay DXP | <7.2 | |
Liferay DXP | =7.2 | |
Liferay DXP | =7.2-fix_pack_1 | |
Liferay DXP | =7.2-fix_pack_10 | |
Liferay DXP | =7.2-fix_pack_11 | |
Liferay DXP | =7.2-fix_pack_12 | |
Liferay DXP | =7.2-fix_pack_13 | |
Liferay DXP | =7.2-fix_pack_14 | |
Liferay DXP | =7.2-fix_pack_15 | |
Liferay DXP | =7.2-fix_pack_16 | |
Liferay DXP | =7.2-fix_pack_17 | |
Liferay DXP | =7.2-fix_pack_18 | |
Liferay DXP | =7.2-fix_pack_2 | |
Liferay DXP | =7.2-fix_pack_3 | |
Liferay DXP | =7.2-fix_pack_4 | |
Liferay DXP | =7.2-fix_pack_5 | |
Liferay DXP | =7.2-fix_pack_6 | |
Liferay DXP | =7.2-fix_pack_7 | |
Liferay DXP | =7.2-fix_pack_8 | |
Liferay DXP | =7.2-fix_pack_9 | |
Liferay DXP | =7.2-service_pack_1 | |
Liferay DXP | =7.2-service_pack_2 | |
Liferay DXP | =7.2-service_pack_3 | |
Liferay DXP | =7.2-service_pack_4 | |
Liferay DXP | =7.2-service_pack_5 | |
Liferay DXP | =7.2-service_pack_6 | |
Liferay DXP | =7.3 | |
Liferay DXP | =7.3-fix_pack_1 | |
Liferay DXP | =7.3-fix_pack_2 | |
Liferay DXP | =7.3-service_pack_1 | |
Liferay DXP | =7.3-service_pack_3 | |
Liferay DXP | =7.3-update4 | |
Liferay DXP | =7.4 | |
Liferay DXP | =7.4-update1 | |
Liferay DXP | =7.4-update10 | |
Liferay DXP | =7.4-update11 | |
Liferay DXP | =7.4-update12 | |
Liferay DXP | =7.4-update13 | |
Liferay DXP | =7.4-update14 | |
Liferay DXP | =7.4-update15 | |
Liferay DXP | =7.4-update16 | |
Liferay DXP | =7.4-update17 | |
Liferay DXP | =7.4-update18 | |
Liferay DXP | =7.4-update19 | |
Liferay DXP | =7.4-update2 | |
Liferay DXP | =7.4-update20 | |
Liferay DXP | =7.4-update21 | |
Liferay DXP | =7.4-update22 | |
Liferay DXP | =7.4-update23 | |
Liferay DXP | =7.4-update24 | |
Liferay DXP | =7.4-update25 | |
Liferay DXP | =7.4-update3 | |
Liferay DXP | =7.4-update4 | |
Liferay DXP | =7.4-update5 | |
Liferay DXP | =7.4-update6 | |
Liferay DXP | =7.4-update7 | |
Liferay DXP | =7.4-update8 | |
Liferay DXP | =7.4-update9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-26267 has not been explicitly rated, but it represents a significant risk due to the exposure of sensitive information.
To fix CVE-2024-26267, update Liferay Portal to version 7.4.3.26 or later, or apply the necessary updates for Liferay DXP as specified by the vendor.
CVE-2024-26267 affects Liferay Portal versions 7.2.0 through 7.4.3.25 and older unsupported versions, as well as Liferay DXP 7.4 before update 26.
The impact of CVE-2024-26267 is that it potentially allows remote attackers to access sensitive version information through exposed HTTP headers.
As a temporary workaround for CVE-2024-26267, consider configuring the portal property 'http.header.version.verbosity' to a less verbose setting until an update can be applied.