Details

    • Type: Bug Bug
    • Status: Closed
    • Priority: Minor Minor
    • Resolution: Fixed
    • Affects Version/s: 4.3.6
    • Fix Version/s: 4.3.7, 4.4.0
    • Component/s: None
    • Labels:
      None
    • Similar Issues:
      Show 5 results 

      Description

      DESCRIPTION:
      Liferay doesn't properly sanitize name of user agent in Enterprise Admin -> Monitoring -> Live Sessions ->

      {Session}

      which allow to craft XSS attack targeted directly to Portal Administrator.
      This vulnerability which conjunction with CSRF can lead to serious problems.

      ATTACK IMPACT:
      See other XSS and CSRF reports

      ATTACK CONSTRAINTS:
      User with access to any account on Liferay based portal
      NOTE: Attack must set to User-Agent HTTP header before session is created (so User-Agent must present itself with attack from the beginning of User-Agent <-> Server interaction) !!!

      EXAMPLE EXPLOIT AND VERIFICATION:
      Please use software proxy that allows to modify HTTP traffic or write simple user-agent in f.e. Perl.
      Set value of HTTP User-Agent to f.e (Internet Explorer + an attack).
      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)<<script>script>alert('XSS !!!')<</script>/script>

        Activity

        There are no comments yet on this issue.

          People

          • Votes:
            0 Vote for this issue
            Watchers:
            0 Start watching this issue

            Dates

            • Created:
              Updated:
              Resolved:

              Development

                Structure Helper Panel