Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157254/Liferay-Portal-Java-Unmarshalling-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/158392/Liferay-Portal-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
https://portal.liferay.dev/learn/security/known-vulnerabilities | Vendor Advisory |
https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271 | Vendor Advisory |
https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-03-20 19:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-7961
Mitre link : CVE-2020-7961
CVE.ORG link : CVE-2020-7961
JSON object : View
Products Affected
liferay
- liferay_portal
CWE
CWE-502
Deserialization of Untrusted Data