Vulnerability Description
In Liferay Portal before 7.1 CE GA4, an XSS vulnerability exists in the SimpleCaptcha API when custom code passes unsanitized input into the "url" parameter of the JSP taglib call <liferay-ui:captcha url="<%= url %>" /> or <liferay-captcha:captcha url="<%= url %>" />. Liferay Portal out-of-the-box behavior with no customizations is not vulnerable.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Liferay | Liferay Portal | <= 6.0.6 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/153252/Liferay-Portal-7.1-CE-GA4-Cross-Site
- https://dev.liferay.com/web/community-security-team/known-vulnerabilities/liferaVendor Advisory
- http://packetstormsecurity.com/files/153252/Liferay-Portal-7.1-CE-GA4-Cross-Site
- https://dev.liferay.com/web/community-security-team/known-vulnerabilities/liferaVendor Advisory
FAQ
What is CVE-2019-6588?
CVE-2019-6588 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In Liferay Portal before 7.1 CE GA4, an XSS vulnerability exists in the SimpleCaptcha API when custom code passes unsanitized input into the "url" parameter of the JSP taglib call <liferay-ui:captcha ...
How severe is CVE-2019-6588?
CVE-2019-6588 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-6588?
Check the references section above for vendor advisories and patch information. Affected products include: Liferay Liferay Portal.