ID CVE-2011-1571
Summary Unspecified vulnerability in the XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote attackers to execute arbitrary commands via unknown vectors.
References
Vulnerable Configurations
  • cpe:2.3:a:liferay:portal:6.0.4:-:community
    cpe:2.3:a:liferay:portal:6.0.4:-:community
  • cpe:2.3:a:liferay:portal:6.0.1:-:community
    cpe:2.3:a:liferay:portal:6.0.1:-:community
  • cpe:2.3:a:liferay:portal:6.0.3:-:community
    cpe:2.3:a:liferay:portal:6.0.3:-:community
  • cpe:2.3:a:liferay:portal:6.0.0:-:community
    cpe:2.3:a:liferay:portal:6.0.0:-:community
  • cpe:2.3:a:liferay:portal:6.0.2:-:community
    cpe:2.3:a:liferay:portal:6.0.2:-:community
  • cpe:2.3:a:liferay:portal:6.0.5:-:community
    cpe:2.3:a:liferay:portal:6.0.5:-:community
  • cpe:2.3:a:liferay:portal:5.0.0:rc:community
    cpe:2.3:a:liferay:portal:5.0.0:rc:community
  • cpe:2.3:a:liferay:portal:5.0.1:rc:community
    cpe:2.3:a:liferay:portal:5.0.1:rc:community
  • cpe:2.3:a:liferay:portal:5.1.0:-:community
    cpe:2.3:a:liferay:portal:5.1.0:-:community
  • cpe:2.3:a:liferay:portal:5.1.1:-:community
    cpe:2.3:a:liferay:portal:5.1.1:-:community
  • cpe:2.3:a:liferay:portal:5.1.2:-:community
    cpe:2.3:a:liferay:portal:5.1.2:-:community
  • cpe:2.3:a:liferay:portal:5.2.0:-:community
    cpe:2.3:a:liferay:portal:5.2.0:-:community
  • cpe:2.3:a:liferay:portal:5.2.1:-:community
    cpe:2.3:a:liferay:portal:5.2.1:-:community
  • cpe:2.3:a:liferay:portal:5.2.2:-:community
    cpe:2.3:a:liferay:portal:5.2.2:-:community
  • cpe:2.3:a:liferay:portal:5.2.3:-:community
    cpe:2.3:a:liferay:portal:5.2.3:-:community
  • Apache Software Foundation Tomcat
    cpe:2.3:a:apache:tomcat
CVSS
Base: 9.3 (as of 09-05-2011 - 12:13)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
description Liferay XSL - Command Execution. CVE-2011-1571. Webapps exploits for multiple platform
id EDB-ID:18715
last seen 2016-02-02
modified 2012-04-08
published 2012-04-08
reporter Spencer McIntyre
source https://www.exploit-db.com/download/18715/
title Liferay XSL - Command Execution
nessus via4
NASL family CGI abuses
NASL id LIFERAY_6_0_6.NASL
description According to its self-reported version number, the installation of Liferay Portal hosted on the remote web server is affected by multiple vulnerabilities : - An arbitrary file download vulnerability exists when Apache Tomcat is used, which allows remote, authenticated users to download arbitrary files via an entity declaration in conjunction with an entity reference, related to an XML External Entity (aka XXE) issue. (CVE-2011-1502) - An arbitrary file download vulnerability exists when Apache Tomcat or Oracle GlassFish is used. The XSL Content portlet allows remote, authenticated users to read arbitrary XSL / XML files via a file:/// URL. (CVE-2011-1503) - A cross-site scripting vulnerability exists, which allows remote, authenticated users to inject arbitrary JavaScript or HTML via a blog title. (CVE-2011-1504) - A cross-site scripting vulnerability exists when Apache Tomcat is used, which allows remote, authenticated users to inject arbitrary JavaScript or HTML via a message title. (CVE-2011-1570) - An unspecified vulnerability exists when Apache Tomcat is used. The XSL Content portlet allows remote attackers to execute arbitrary commands via unknown vectors. (CVE-2011-1571) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
last seen 2018-06-14
modified 2018-06-13
plugin id 59230
published 2012-05-22
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=59230
title Liferay Portal < 6.0.6 Multiple Vulnerabilities
packetstorm via4
data source https://packetstormsecurity.com/files/download/111651/liferay_xsl.rb.txt
id PACKETSTORM:111651
last seen 2016-12-05
published 2012-04-07
reporter Nicolas Gregoire
source https://packetstormsecurity.com/files/111651/Liferay-XSL-Command-Execution.html
title Liferay XSL Command Execution
refmap via4
confirm
mlist
  • [oss-security] 20110329 CVE requests : Liferay 6.0.6
  • [oss-security] 20110408 Re: CVE requests : Liferay 6.0.6
  • [oss-security] 20110411 Re: CVE requests : Liferay 6.0.6
Last major update 31-05-2011 - 00:00
Published 07-05-2011 - 15:55
Back to Top