We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-25148



Description

In Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions the `doAsUserId` URL parameter may get leaked when creating linked content using the WYSIWYG editor and while impersonating a user. This may allow remote authenticated users to impersonate a user after accessing the linked content.

Reserved 2024-02-06 | Published 2024-02-08 | Updated 2024-10-02 | Assigner Liferay


MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

Product status

Default status
unknown

7.2.0
affected

Default status
unknown

7.3.10
affected

7.2.10
affected

References

liferay.dev/...-/asset_publisher/jekt/content/cve-2024-25148 vendor-advisory

cve.org (CVE-2024-25148)

nvd.nist.gov (CVE-2024-25148)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-25148

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.