CVE-2011-1503
Published May 7, 2011
Last updated 4 years ago
Overview
- Description
- The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "8AEE2383-4164-4729-8A51-EC4F5C4CB086", "versionEndIncluding": "5.1.2", "versionStartIncluding": "5.1.0" }, { "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "1D5343EC-9611-43F3-8A4F-57450BE47951", "versionEndIncluding": "5.2.3", "versionStartIncluding": "5.2.0" }, { "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "36D6FB97-DA02-4BE8-9546-2676F79BD9BA", "versionEndIncluding": "6.0.5", "versionStartIncluding": "6.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" }, { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51" } ], "operator": "OR" } ], "operator": "AND" } ]