Lucene search

K
githubGitHub Advisory DatabaseGHSA-CHRC-Q6V3-JFV8
HistoryMay 24, 2023 - 6:30 p.m.

Liferay Portal has Inefficient Regular Expression

2023-05-2418:30:26
CWE-1333
GitHub Advisory Database
github.com
7
liferay portal
regular expression
redos attacks
server resources
crafted request
remote attackers
software

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

52.0%

Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs.

Affected configurations

Vulners
Node
com.liferay.portal\Matchrelease.portal.bom

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

52.0%

Related for GHSA-CHRC-Q6V3-JFV8