First published: Tue Oct 22 2024(Updated: )
Cross-site request forgery (CSRF) vulnerability in the My Account widget in Liferay Portal 7.4.3.75 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 update 75 through update 92 and 7.3 update 32 through update 36 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_my_account_web_portlet_MyAccountPortlet_backURL parameter.
Credit: security@liferay.com
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay 7.4 GA | >=2023.q3.1<2023.q3.6 | |
Liferay 7.4 GA | >=2023.q4.0<2023.q4.3 | |
Liferay 7.4 GA | =7.3-update32 | |
Liferay 7.4 GA | =7.3-update33 | |
Liferay 7.4 GA | =7.3-update34 | |
Liferay 7.4 GA | =7.3-update35 | |
Liferay 7.4 GA | =7.4-update75 | |
Liferay 7.4 GA | =7.4-update76 | |
Liferay 7.4 GA | =7.4-update77 | |
Liferay 7.4 GA | =7.4-update78 | |
Liferay 7.4 GA | =7.4-update79 | |
Liferay 7.4 GA | =7.4-update80 | |
Liferay 7.4 GA | =7.4-update81 | |
Liferay 7.4 GA | =7.4-update82 | |
Liferay 7.4 GA | =7.4-update83 | |
Liferay 7.4 GA | =7.4-update84 | |
Liferay 7.4 GA | =7.4-update85 | |
Liferay 7.4 GA | =7.4-update86 | |
Liferay 7.4 GA | =7.4-update87 | |
Liferay 7.4 GA | =7.4-update88 | |
Liferay 7.4 GA | =7.4-update89 | |
Liferay 7.4 GA | =7.4-update90 | |
Liferay 7.4 GA | =7.4-update91 | |
Liferay 7.4 GA | =7.4-update92 | |
Liferay 7.4 GA | >=7.4.3.75<7.4.3.112 | |
maven/com.liferay.portal:release.dxp.bom | >=7.4u75<=7.4u92 | 7.4u93 |
maven/com.liferay.portal:release.dxp.bom | >=7.3u32<=7.3u36 | 7.3u37 |
maven/com.liferay.portal:release.dxp.bom | >=2023.Q3.1<2023.Q3.6 | 2023.Q3.6 |
maven/com.liferay.portal:release.dxp.bom | >=2023.Q4.0<2023.Q4.3 | 2023.Q4.3 |
maven/com.liferay.portal:release.portal.bom | >=7.4.3.75<7.4.3.112 | 7.4.3.112 |
>=2023.q3.1<2023.q3.6 | ||
>=2023.q4.0<2023.q4.3 | ||
=7.3-update32 | ||
=7.3-update33 | ||
=7.3-update34 | ||
=7.3-update35 | ||
=7.4-update75 | ||
=7.4-update76 | ||
=7.4-update77 | ||
=7.4-update78 | ||
=7.4-update79 | ||
=7.4-update80 | ||
=7.4-update81 | ||
=7.4-update82 | ||
=7.4-update83 | ||
=7.4-update84 | ||
=7.4-update85 | ||
=7.4-update86 | ||
=7.4-update87 | ||
=7.4-update88 | ||
=7.4-update89 | ||
=7.4-update90 | ||
=7.4-update91 | ||
=7.4-update92 | ||
>=7.4.3.75<7.4.3.112 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26271 has been classified as a high-severity cross-site request forgery (CSRF) vulnerability.
To fix CVE-2024-26271, upgrade to a patched version of Liferay Portal or Liferay DXP as specified in the vendor's security advisory.
CVE-2024-26271 affects Liferay Portal versions 7.4.3.75 to 7.4.3.111 and Liferay DXP versions 2023.Q4.0 to 2023.Q4.2 among others.
CVE-2024-26271 is a cross-site request forgery (CSRF) vulnerability.
Remote attackers can exploit CVE-2024-26271 to change user credentials and other settings.