CVE-2024-38002

Oct. 30, 2024, 2:47 p.m.

8.8
High

Description

The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a workflow definition, which allows remote authenticated users to modify workflow definitions and execute arbitrary code (RCE) via the headless API.

Product(s) Impacted

Vendor Product Versions
Liferay
  • Digital Experience Platform
  • Liferay Portal
  • 7.3, 7.4, 2023
  • *

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-863
Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a liferay digital_experience_platform 7.3 - / / / / / /
a liferay digital_experience_platform 7.4 - / / / / / /
a liferay digital_experience_platform 2023 q3.1 / / / / / /
a liferay digital_experience_platform 2023 q3.8 / / / / / /
a liferay digital_experience_platform 2023 q4.0 / / / / / /
a liferay digital_experience_platform 2023 q4.5 / / / / / /
a liferay liferay_portal / / / / / / / /
a liferay liferay_portal / / / / / / / /

CVSS Score

8.8 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: Oct. 22, 2024, 3:15 p.m.
Last Modified: Oct. 30, 2024, 2:47 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security@liferay.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.