The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
References
Link | Resource |
---|---|
http://issues.liferay.com/browse/LPS-13762 | Issue Tracking Vendor Advisory |
http://openwall.com/lists/oss-security/2011/04/08/5 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/29/1 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/04/11/9 | Mailing List Third Party Advisory |
http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 | Issue Tracking Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2011-05-07 12:55
Updated : 2020-07-23 11:22
NVD link : CVE-2011-1503
Mitre link : CVE-2011-1503
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
liferay
- liferay_portal
microsoft
- windows_7
linux
- linux_kernel