Overview
- Description
- Liferay Portal Server tested on 7.3.5 GA6, 7.2.0 GA1 is affected by OS Command Injection. An administrator user can inject commands through the Gogo Shell module to execute any OS command on the Liferay Portal Sever. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to access and execute commands in Gogo Shell and therefore not a design fla
- Source
- cve@mitre.org
- NVD status
- Modified
- CNA Tags
- disputed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-78
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:liferay:liferay_portal:7.2:ga1:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "EE4E1281-8507-42CB-9330-7D4B23247164" }, { "criteria": "cpe:2.3:a:liferay:liferay_portal:7.3.5:ga6:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "C954CFAB-373F-4E6F-9DDD-DDACC0ED3353" } ], "operator": "OR" } ] } ]