Plataforma
java
Componente
com.liferay.portal:release.portal.bom
Corrigido em
7.4.4
7.4.14
7.3.11
7.2.11
7.4.3.14
CVE-2024-26266 describes multiple stored cross-site scripting (XSS) vulnerabilities affecting Liferay Portal versions 7.2.0 through 7.4.3.13, and older unsupported versions, as well as Liferay DXP versions prior to update 10. An attacker can inject arbitrary web script or HTML by crafting a payload within the first, middle, or last name fields of a user creating entries in the Announcement or Alerts widgets. Affected versions include Liferay Portal 7.2 before fix pack 17. The vulnerability is resolved in Liferay Portal 7.4.3.14.
Successful exploitation of CVE-2024-26266 allows an attacker to execute arbitrary JavaScript code in the context of a victim's browser session. This can lead to account takeover, data theft (including sensitive user information stored within Liferay), and defacement of the Liferay Portal instance. The attacker could potentially leverage this to move laterally within the network if the compromised user has elevated privileges or access to other systems. The impact is particularly severe given the widespread use of Liferay Portal in enterprise environments, often handling critical business data and processes.
CVE-2024-26266 was publicly disclosed on February 21, 2024. No known public exploits or active campaigns have been reported at the time of writing, but the CRITICAL severity and ease of exploitation suggest that it is likely to become a target. The vulnerability is not currently listed on CISA KEV. Given the widespread use of Liferay Portal, organizations are strongly encouraged to prioritize patching.
Organizations utilizing Liferay Portal 7.2.0 through 7.4.3.13, and older unsupported versions, and Liferay DXP versions prior to update 10 are at risk. This includes businesses relying on Liferay for content management, intranet portals, and customer experience platforms. Shared hosting environments where multiple users have access to create content within Liferay are particularly vulnerable.
• linux / server:
journalctl -u liferay-portal | grep -i "XSS"• generic web:
curl -I https://<liferay_portal_url>/ | grep -i "X-XSS-Protection"• wordpress / composer / npm: (Not applicable as Liferay is not a WordPress/Composer/npm component) • database (mysql, redis, mongodb, postgresql): (Not applicable as the vulnerability is not directly related to the database) • windows / supply-chain: (Not applicable as Liferay is not a Windows/supply-chain component)
disclosure
patch
Status do Exploit
EPSS
0.15% (percentil 36%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2024-26266 is to upgrade Liferay Portal to version 7.4.3.14 or later, or to Liferay DXP to update 10 or later. If immediate upgrading is not possible, consider implementing strict input validation and output encoding on user-supplied data within the Announcement and Alerts widgets. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Monitor Liferay logs for suspicious activity, particularly related to user profile updates and widget creation. Review user access controls to limit the number of users with the ability to create entries in these widgets.
Atualize Liferay Portal para a versão mais recente disponível. Para Liferay DXP, atualize para a versão 7.4 Update 10, 7.3 Update 4 ou 7.2 Fix Pack 17, ou uma versão posterior. Isso corrigirá as vulnerabilidades de cross-site scripting (XSS) armazenado.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2024-26266 is a critical stored cross-site scripting (XSS) vulnerability in Liferay Portal and DXP versions allowing attackers to inject malicious scripts through user name fields in widgets.
You are affected if you are running Liferay Portal versions 7.2.0 through 7.4.3.13, or older unsupported versions, and Liferay DXP versions prior to update 10.
Upgrade to Liferay Portal 7.4.3.14 or later, or to Liferay DXP update 10 or later. Consider input validation and WAF rules as temporary mitigations.
No active exploitation has been confirmed, but the CRITICAL severity suggests it is a likely target.
Refer to the official Liferay security advisory: [https://liferay.com/security-advisories/liferay-portal-dxp-74-3-14-and-liferay-dxp-73-4-released](https://liferay.com/security-advisories/liferay-portal-dxp-74-3-14-and-liferay-dxp-73-4-released)
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Envie seu arquivo pom.xml e descubra na hora se você está afetado.