logo

CVE-2023-33950 com.liferay.portal:release.portal.bom

Package

Manager: maven
Name: com.liferay.portal:release.portal.bom
Vulnerable Version: >=7.4.3.48 <7.4.3.77

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00448 pctl0.62663

Details

Liferay Portal has Inefficient Regular Expression Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs.

Metadata

Created: 2023-05-24T18:30:26Z
Modified: 2023-05-24T21:56:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-chrc-q6v3-jfv8/GHSA-chrc-q6v3-jfv8.json
CWE IDs: ["CWE-1333"]
Alternative ID: GHSA-chrc-q6v3-jfv8
Finding: F211
Auto approve: 1