The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
References
Link | Resource |
---|---|
http://issues.liferay.com/browse/LPS-13762 | Issue Tracking Vendor Advisory |
http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 | Issue Tracking Release Notes Vendor Advisory |
http://openwall.com/lists/oss-security/2011/03/29/1 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/04/08/5 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/04/11/9 | Mailing List Third Party Advisory |
http://issues.liferay.com/browse/LPS-13762 | Issue Tracking Vendor Advisory |
http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 | Issue Tracking Release Notes Vendor Advisory |
http://openwall.com/lists/oss-security/2011/03/29/1 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/04/08/5 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/04/11/9 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://issues.liferay.com/browse/LPS-13762 - Issue Tracking, Vendor Advisory | |
References | () http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 - Issue Tracking, Release Notes, Vendor Advisory | |
References | () http://openwall.com/lists/oss-security/2011/03/29/1 - Mailing List, Third Party Advisory | |
References | () http://openwall.com/lists/oss-security/2011/04/08/5 - Mailing List, Third Party Advisory | |
References | () http://openwall.com/lists/oss-security/2011/04/11/9 - Mailing List, Third Party Advisory |
Information
Published : 2011-05-07 19:55
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1503
Mitre link : CVE-2011-1503
CVE.ORG link : CVE-2011-1503
JSON object : View
Products Affected
liferay
- liferay_portal
linux
- linux_kernel
microsoft
- windows_7
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor