CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:N/I:P/A:N
EPSS
Percentile
69.8%
Liferay Portal contains a cross-site scripting vulnerability in the handling of the User-Agent HTTP header, which can allow a remote, authenticated attacker to inject content into “Forgot Password” emails.
Liferay Portal is an enterprise portal solution that uses Java technologies. The “Forgot Password” feature of Liferay Portal fails to properly sanitize the User-Agent field supplied in HTTP headers. This can allow a remote, authenticated attacker to inject content into the email that is generated by the “Forgot Password” feature.
A remote, authenticated attacker may be able to inject content into the email messages generated by the “Forgot Password” feature.
Apply an update
This issue is addressed in Liferay versions 4.4.0 and 4.3.7, as specified in Liferay support document LEP-4737.
888209
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: January 31, 2008
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
This issue is addressed in Liferay versions 4.4.0 and 4.3.7, as specified in Liferay support document LEP-4737.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23888209 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Tomasz Kuczynski for reporting this vulnerability.
This document was written by Will Dormann.
CVE IDs: | CVE-2008-0179 |
---|---|
Severity Metric: | 0.38 Date Public: |