Vulnerability Details : CVE-2020-13445
Potential exploit
In Liferay Portal before 7.3.2 and Liferay DXP 7.0 before fix pack 92, 7.1 before fix pack 18, and 7.2 before fix pack 6, the template API does not restrict user access to sensitive objects, which allows remote authenticated users to execute arbitrary code via crafted FreeMarker and Velocity templates.
Vulnerability category: Execute code
Products affected by CVE-2020-13445
- cpe:2.3:a:liferay:liferay_portal:7.1.1:ga2:*:*:community:*:*:*
- cpe:2.3:a:liferay:liferay_portal:7.1:ga1:*:*:community:*:*:*
- cpe:2.3:a:liferay:liferay_portal:7.1:ga2:*:*:community:*:*:*
- cpe:2.3:a:liferay:liferay_portal:7.1:ga3:*:*:community:*:*:*
- cpe:2.3:a:liferay:liferay_portal:7.2:ga1:*:*:community:*:*:*
- cpe:2.3:a:liferay:liferay_portal:7.3:ga1:*:*:community:*:*:*
- cpe:2.3:a:liferay:liferay_portal:7.3:ga2:*:*:community:*:*:*
Threat overview for CVE-2020-13445
Top countries where our scanners detected CVE-2020-13445
Top open port discovered on systems with this issue
80
IPs affected by CVE-2020-13445 26
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2020-13445!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2020-13445
3.80%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-13445
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2020-13445
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
-
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-13445
-
https://issues.liferay.com/browse/LPE-17023
[LPE-17023] Remote code execution (RCE) with FreeMarker/Velocity templates - Liferay IssuesPatch;Vendor Advisory
-
https://securitylab.github.com/advisories/GHSL-2020-043-liferay_ce
GHSL-2020-043: Server-side template injection in Liferay - CVE-2020-13445 - GitHub Security LabExploit;Third Party Advisory
-
https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119317411
CST-7302 Remote code execution with FreeMarker/Velocity templates (CVE-2020-13445)Patch;Vendor Advisory
Jump to