Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).
References
Link | Resource |
---|---|
https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271 | Vendor Advisory |
https://portal.liferay.dev/learn/security/known-vulnerabilities | Vendor Advisory |
http://packetstormsecurity.com/files/157254/Liferay-Portal-Java-Unmarshalling-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/158392/Liferay-Portal-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-03-20 12:15
Updated : 2021-01-29 18:31
NVD link : CVE-2020-7961
Mitre link : CVE-2020-7961
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
liferay
- liferay_portal