Vulnerability Details : CVE-2021-29048
Cross-site scripting (XSS) vulnerability in the Layout module's page administration page in Liferay Portal 7.3.4, 7.3.5 and Liferay DXP 7.2 before fix pack 11 and 7.3 before fix pack 1 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_name parameter.
Vulnerability category: Cross site scripting (XSS)
Threat overview for CVE-2021-29048
Top countries where our scanners detected CVE-2021-29048
Top open port discovered on systems with this issue
80
IPs affected by CVE-2021-29048 16
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2021-29048!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2021-29048
Probability of exploitation activity in the next 30 days: 0.12%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 46 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-29048
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2021-29048
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-29048
-
http://liferay.com
Digital Experience Software Tailored to Your Needs | LiferayVendor Advisory
-
https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/120743601
CVE-2021-29048 Stored XSS with Site Page nameVendor Advisory
Products affected by CVE-2021-29048
- cpe:2.3:a:liferay:liferay_portal:7.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:liferay:liferay_portal:7.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:-:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_1:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_2:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_3:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_4:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_5:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.3:-:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_6:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_7:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_8:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_9:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_10:*:*:*:*:*:*