Vulnerability Description
Liferay Portal Server tested on 7.3.5 GA6, 7.2.0 GA1 is affected by OS Command Injection. An administrator user can inject Groovy script to execute any OS command on the Liferay Portal Sever. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to run groovy scripts and therefore not a design flaw.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Liferay | Liferay Portal | 7.2 |
Related Weaknesses (CWE)
References
- https://learn.liferay.com/dxp/latest/en/system-administration/using-the-script-eVendor Advisory
- https://medium.com/%40tranpdanh/some-way-to-execute-os-command-in-liferay-portal
- https://learn.liferay.com/dxp/latest/en/system-administration/using-the-script-eVendor Advisory
- https://medium.com/%40tranpdanh/some-way-to-execute-os-command-in-liferay-portal
FAQ
What is CVE-2020-28884?
CVE-2020-28884 is a vulnerability with a CVSS score of 7.2 (HIGH). Liferay Portal Server tested on 7.3.5 GA6, 7.2.0 GA1 is affected by OS Command Injection. An administrator user can inject Groovy script to execute any OS command on the Liferay Portal Sever. NOTE: Th...
How severe is CVE-2020-28884?
CVE-2020-28884 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-28884?
Check the references section above for vendor advisories and patch information. Affected products include: Liferay Liferay Portal.