CVE-2011-1503

The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
References
Link Resource
http://issues.liferay.com/browse/LPS-13762 Issue Tracking Vendor Advisory
http://openwall.com/lists/oss-security/2011/04/08/5 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/03/29/1 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/04/11/9 Mailing List Third Party Advisory
http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 Issue Tracking Release Notes Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*
cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*
cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*

Information

Published : 2011-05-07 12:55

Updated : 2020-07-23 11:22


NVD link : CVE-2011-1503

Mitre link : CVE-2011-1503


JSON object : View

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

Advertisement

dedicated server usa

Products Affected

liferay

  • liferay_portal

microsoft

  • windows_7

linux

  • linux_kernel