Vulnerability Details : CVE-2021-33322
In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.0 before fix pack 96, 7.1 before fix pack 18, and 7.2 before fix pack 5, password reset tokens are not invalidated after a user changes their password, which allows remote attackers to change the user’s password via the old password reset token.
Products affected by CVE-2021-33322
- cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:-:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_13:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_14:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_24:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_25:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_26:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_27:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_28:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_3\+:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_30:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_33:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_35:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_36:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_39:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_40:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_41:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_42:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_43:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_44:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_45:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_46:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_47:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_48:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_49:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_50:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_51:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_52:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_53:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_54:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_56:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_57:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_58:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_59:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_60:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_61:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_64:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_65:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_66:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_67:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_68:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_69:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_70:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_71:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_72:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_73:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_75:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_76:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_78:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_79:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_80:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_81:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:-:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_1:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_10:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_11:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_12:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_13:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_14:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_15:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_16:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_2:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_3:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_4:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_5:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_6:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_7:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_8:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_9:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:-:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_1:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_2:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_3:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.2:fix_pack_4:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_82:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_83:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_84:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_85:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_86:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_87:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_88:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_89:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_90:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_91:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_92:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_93:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_94:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.0:fix_pack_95:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_17:*:*:*:*:*:*
- cpe:2.3:a:liferay:dxp:7.1:fix_pack_18:*:*:*:*:*:*
Threat overview for CVE-2021-33322
Top countries where our scanners detected CVE-2021-33322
Top open port discovered on systems with this issue
80
IPs affected by CVE-2021-33322 557
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2021-33322!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2021-33322
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-33322
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2021-33322
-
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-33322
-
https://issues.liferay.com/browse/LPE-16981
[LPE-16981] Password change does not invalidate password reset tokens - Liferay IssuesPatch;Vendor Advisory
-
https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/120748020
CVE-2021-33322 Password change does not invalidate password reset tokensRelease Notes;Vendor Advisory
Jump to