Overview
- Description
- The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a workflow definition, which allows remote authenticated users to modify workflow definitions and execute arbitrary code (RCE) via the headless API.
- Source
- security@liferay.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
CVE-2024-38002 The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 a… https://t.co/KOvzqAOM58
@CVEnew
22 Oct 2024
71 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-38002: CRITICAL] Critical vulnerability in Liferay Portal & DXP versions allows remote authenticated users to modify workflow definitions & execute arbitrary code. Update now!#cybersecurity,#vulnerability https://t.co/wRyssUZmTe https://t.co/0WuMClq5bO
@CveFindCom
22 Oct 2024
48 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" }, { "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E" }, { "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A13C2E9-9260-466E-9D98-0021CB2F41F8" }, { "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44D45214-03A5-45A5-B413-1648BD0A740C" }, { "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6C54C71-6885-475B-939B-CEC309579BBA" }, { "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE1390BB-5145-4DDF-B113-9F8B190D4E0A" }, { "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F2C2272-3E19-4836-BCA5-660208D5985D", "versionEndIncluding": "7.3.7", "versionStartIncluding": "7.3.2" }, { "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D6470C7-9D36-43F3-86CB-B79ED9EA53F4", "versionEndExcluding": "7.4.3.112", "versionStartIncluding": "7.4.0" } ], "operator": "OR" } ] } ]