平台
java
组件
com.liferay.portal:release.portal.bom
修复版本
7.4.4
7.4.14
7.3.11
7.2.11
7.4.3.5
CVE-2024-25603 describes a stored cross-site scripting (XSS) vulnerability discovered in the Dynamic Data Mapping (DDM) module of Liferay Portal. This vulnerability allows a remote, authenticated user to inject arbitrary web scripts or HTML, potentially leading to account takeover or defacement. The vulnerability impacts Liferay Portal versions 7.2.0 through 7.4.3.4, and older unsupported versions, as well as Liferay DXP 7.4.13, 7.3 before update 4, and 7.2 before fix pack 17. A fix is available in Liferay Portal 7.4.3.5.
Successful exploitation of CVE-2024-25603 allows an attacker to inject malicious JavaScript code into Liferay Portal pages viewed by other authenticated users. This can be leveraged to steal session cookies, redirect users to phishing sites, or modify the content of the portal. The impact is particularly severe because the vulnerability is stored, meaning the injected script persists until removed, potentially affecting a large number of users. An attacker could also use this to gain administrative privileges if the injected script targets administrative functions, leading to complete control of the Liferay instance. This vulnerability shares similarities with other XSS vulnerabilities where malicious scripts are injected into trusted websites to compromise user accounts.
CVE-2024-25603 was publicly disclosed on February 21, 2024. There is currently no indication of active exploitation in the wild, but the vulnerability's criticality and ease of exploitation suggest it could become a target. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are likely to emerge given the vulnerability's nature and severity.
Organizations using Liferay Portal and DXP in environments where authenticated users have access to the Dynamic Data Mapping module are at risk. This includes businesses utilizing Liferay for content management, intranet portals, and customer experience platforms. Legacy Liferay installations running unsupported versions are particularly vulnerable due to lack of security updates.
• linux / server: Examine Liferay Portal access logs for suspicious requests targeting the DDMForm with unusual parameters in the instanceId field. Use grep to search for patterns like <script> or javascript: within these requests.
grep -i '<script' /path/to/liferay/portal/logs/access.log• generic web: Use curl to test the DDMForm endpoint with a simple XSS payload in the instanceId parameter and observe the response for signs of script execution.
curl -X POST -d "instanceId=<script>alert('XSS')</script>" <liferay_portal_url>/ddm/forms/<form_id>• java: Monitor Liferay Portal's internal logging for errors related to DDMForm processing or unexpected script execution. Analyze stack traces for clues related to the vulnerability. • wordpress / composer / npm: N/A - This vulnerability is specific to Liferay Portal, not WordPress or its dependencies. • database (mysql, redis, mongodb, postgresql): N/A - This vulnerability is not related to database systems.
disclosure
patch
漏洞利用状态
EPSS
0.15% (36% 百分位)
CVSS 向量
The primary mitigation for CVE-2024-25603 is to upgrade Liferay Portal to version 7.4.3.5 or later. If upgrading immediately is not possible, consider implementing input validation and output encoding on the instanceId parameter within the DDMForm. While not a complete fix, this can reduce the attack surface. Web application firewalls (WAFs) configured to detect and block XSS payloads targeting the DDMForm can also provide a temporary layer of protection. Regularly review and update Liferay Portal's security configuration to ensure best practices are followed. After upgrading, confirm the vulnerability is resolved by attempting to inject a simple script through the DDMForm and verifying it is not executed.
将 Liferay Portal 更新到包含此 XSS 漏洞修复的最新版本。请参阅 Liferay 安全公告以获取有关已修复版本和特定更新步骤的详细信息。
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2024-25603 is a stored cross-site scripting (XSS) vulnerability in Liferay Portal 7.2.0 through 7.4.3.4 and DXP, allowing authenticated users to inject malicious scripts.
You are affected if you are using Liferay Portal versions ≤7.4.3.4 or DXP versions 7.4.13, 7.3 before update 4, or 7.2 before fix pack 17.
Upgrade to Liferay Portal 7.4.3.5 or later. As a temporary measure, implement input validation and output encoding on the instanceId parameter.
There is currently no indication of active exploitation, but the vulnerability's criticality suggests it could become a target.
Refer to the official Liferay security advisory: [https://liferay.com/portal/security-advisory/liferay-portal-dxp-security-vulnerability-xss-in-ddmform](https://liferay.com/portal/security-advisory/liferay-portal-dxp-security-vulnerability-xss-in-ddmform)
上传你的 pom.xml 文件,立即知道是否受影响。