We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-25148



AssignerLiferay
Reserved2024-02-06
Published2024-02-08
Updated2024-10-02

Description

In Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions the `doAsUserId` URL parameter may get leaked when creating linked content using the WYSIWYG editor and while impersonating a user. This may allow remote authenticated users to impersonate a user after accessing the linked content.



MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

Product status

Default status
unknown

7.2.0
affected

Default status
unknown

7.3.10
affected

7.2.10
affected

References

https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25148 vendor-advisory

cve.org CVE-2024-25148

nvd.nist.gov CVE-2024-25148

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.