ID: CVE-2023-33942

Last Modified: May 31, 2023

Cross-site scripting (XSS) vulnerability in the Web Content Display widget's article selector in Liferay Liferay Portal 7.4.3.50, and Liferay DXP 7.4 update 50 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a web content article's `Title` field.

Twitter Activity

Tweets last week: 1

Remaining steady

Yahoo Activity

Yahoo results: 0

Remaining steady

EPSS History

Current EPSS Score: 0.00048

Remaining steady


Reddit Activity

Reddit Posts: 0

Remaining steady

Github Repos

Github Repos: 0

Remaining steady

Exploits

Found exploits:

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

User Interaction: Required

Scope: Changed

Confidentiality: Low

Integrity: Low

Availability: None

Base Score: 5.4

Exploitability Score: 2.3

Impact Score: 2.7

CVSS V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Specialize CVSS-Score

CWE-79

Condition Configuration
OR
OR
Alle Schwachstellen für liferay
Alle Schwachstellen für liferay
Date: May 31, 2023

CWE-ID: Not defined
Base Score V3: Not defined
Exploitability Score V3: Not defined
Impact Score V3: Not defined
Cvss Vector V3: Not defined
Configuration:
added:
cpe:2.3:a:liferay:liferay_portal:7.4.3.50:*:*:*:*:*:*:*
cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*



                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:liferay:liferay_portal:7.4.3.50:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*"/>
    </set>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:liferay:liferay_portal:7.4.3.50:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
</set>