{"vulnerability": "CVE-2024-2627", "sightings": [{"uuid": "ff71f93c-212a-4868-8923-d6e86fc6ef82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26278", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7519", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26278\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Custom Fields component not correctly filter inputs, leading to a XSS vector.\n\ud83d\udccf Published: 2024-07-09T16:15:44.821Z\n\ud83d\udccf Modified: 2025-03-14T04:35:37.574Z\n\ud83d\udd17 References:\n1. https://developer.joomla.org/security-centre/939-20240705-core-xss-in-com-fields-default-field-value.html", "creation_timestamp": "2025-03-14T04:53:21.000000Z"}, {"uuid": "6023a0aa-8abc-4d47-b921-09e369508fde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26270", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3316", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26270\n\ud83d\udd25 CVSS Score: 6.4 (CVSS_V3)\n\ud83d\udd39 Description: The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the user\u2019s hashed password in the page\u2019s HTML source, which allows man-in-the-middle attackers to steal a user's hashed password.\n\ud83d\udccf Published: 2024-02-20T15:31:05Z\n\ud83d\udccf Modified: 2025-01-28T23:15:23Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-26270\n2. https://github.com/liferay/liferay-portal\n3. https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26270", "creation_timestamp": "2025-01-29T00:09:49.000000Z"}, {"uuid": "5b9a7367-21da-41cb-9fd7-3c220042e49f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26279", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8804", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26279\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The wrapper extensions do not correctly validate inputs, leading to XSS vectors.\n\ud83d\udccf Published: 2024-07-09T16:15:48.485Z\n\ud83d\udccf Modified: 2025-03-26T04:34:05.778Z\n\ud83d\udd17 References:\n1. https://developer.joomla.org/security-centre/938-20240704-core-xss-in-wrapper-extensions.html", "creation_timestamp": "2025-03-26T05:24:42.000000Z"}, {"uuid": "91290598-668d-4e74-a59c-7d341b6a1b14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26270", "type": "seen", "source": "https://t.me/arpsyndicate/3766", "content": "#ExploitObserverAlert\n\nCVE-2024-26270\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26270. The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the user\u2019s hashed password in the page\u2019s HTML source, which allows man-in-the-middle attackers to steal a user's hashed password.", "creation_timestamp": "2024-02-21T13:27:23.000000Z"}, {"uuid": "82e2fb5e-d9e0-4524-9ee2-cacc278cc869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26273", "type": "seen", "source": "https://t.me/cvedetector/8616", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26273 - Liferay Portal CSRF Remote Execution\", \n  \"Content\": \"CVE ID : CVE-2024-26273 \nPublished : Oct. 22, 2024, 3:15 p.m. | 40\u00a0minutes ago \nDescription : Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.4.0 through 7.4.3.103, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 update 29 through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_commerce_catalog_web_internal_portlet_CommerceCatalogsPortlet_redirect parameter. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-22T17:57:55.000000Z"}, {"uuid": "4bc04a0e-b6e9-4292-b708-7e48806b5cb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26272", "type": "seen", "source": "https://t.me/cvedetector/8615", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26272 - Liferay Portal CSRF Remote Attack Vector\", \n  \"Content\": \"CVE ID : CVE-2024-26272 \nPublished : Oct. 22, 2024, 3:15 p.m. | 40\u00a0minutes ago \nDescription : Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.3.2 through 7.4.3.107, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 GA through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the p_l_back_url parameter. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-22T17:57:55.000000Z"}, {"uuid": "683c6e90-e949-40a8-8a40-fe264ec02eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26271", "type": "seen", "source": "https://t.me/cvedetector/8614", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26271 - Liferay Portal CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-26271 \nPublished : Oct. 22, 2024, 3:15 p.m. | 40\u00a0minutes ago \nDescription : Cross-site request forgery (CSRF) vulnerability in the My Account widget in Liferay Portal 7.4.3.75 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 update 75 through update 92 and 7.3 update 32 through update 36 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_my_account_web_portlet_MyAccountPortlet_backURL parameter. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-22T17:57:51.000000Z"}, {"uuid": "f495a6bd-8539-412b-a670-7fc0ae2b9faa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26270", "type": "seen", "source": "https://t.me/ctinow/203355", "content": "https://ift.tt/PMNT5Wj\nCVE-2024-26270 | Liferay Portal/DXP Account Settings Page insertion of sensitive information into sent data", "creation_timestamp": "2024-03-08T14:51:30.000000Z"}]}