CVE-2011-1503

The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
References
Link Resource
http://issues.liferay.com/browse/LPS-13762 Issue Tracking Vendor Advisory
http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 Issue Tracking Release Notes Vendor Advisory
http://openwall.com/lists/oss-security/2011/03/29/1 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/04/08/5 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2011/04/11/9 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*
cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*
cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-05-07 19:55

Updated : 2023-12-10 11:03


NVD link : CVE-2011-1503

Mitre link : CVE-2011-1503

CVE.ORG link : CVE-2011-1503


JSON object : View

Products Affected

liferay

  • liferay_portal

microsoft

  • windows_7

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor