Synopsis
The remote web server contains a Java application that is affected by multiple vulnerabilities.
Description
According to its self-reported version number, the version of Liferay Portal running on the remote host is 6.1.x or later but prior to 6.1.2. It is, therefore, potentially affected by multiple vulnerabilities.
- A flaw exists where a guest user may view any journal structure or template if they know the specific ID of that element. (LPS-28550)
- A flaw exists with the setupwizard where regardless of what is specified when an account is created, a [email protected] default account with a default password is made. This could allow a remote attacker to access the program or system and attempt to gain privileged access. (LPS-29061)
- An unauthorized information disclosure flaw exists due to failing to restrict access to private announcements when parsing a crafted URL. This could allow a remote attacker with a specially crafted URL to gain access to potentially sensitive information. (LPS-29148)
- A cross-site scripting flaw exists where input to the 'comments' field is not validated when requesting membership to a restricted site. This could allow a remote attacker with a specially crafted request to execute arbitrary code within the browser and server trust relationship. (LPS-29338)
- A flaw exists when handling an organization's permission where an omni-admin is a member of an organization. This could allow the organization's administrator to rest the omni-admin's password. (LPS-30093)
- A flaw exists with the document and media portlets where user's without permission can create folders and files in the root folder. The user can do this by creating the folder or file elsewhere and moving it into the root folder. (LPS-30437)
- A flaw exists where users can be deleted from the portal. A remote attacker with a specially constructed URL can delete a user if they know that user's email address. (LPS-30586)
- A flaw exists with the Knowledge Base portlet. A user with permission to delete an attachment could delete any file on the server, using a specially constructed URL.
(LPS-30796)
Note that Nessus has relied only on the self-reported version number and has not actually tried to exploit these issues or determine if the associated patches have been applied.
Solution
Upgrade to Liferay Portal 6.1.2 or later, or apply the associated patches.
Plugin Details
File Name: liferay_6_1_2.nasl
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Vulnerability Information
CPE: cpe:/a:liferay:portal
Required KB Items: Settings/ParanoidReport, www/liferay_portal
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No known exploits are available
Patch Publication Date: 8/1/2013
Vulnerability Publication Date: 10/23/2012
Reference Information
BID: 56226, 56589
CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990