CVE-2020-13445

Source
https://cve.org/CVERecord?id=CVE-2020-13445
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13445.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-13445
Aliases
Published
2020-06-10T19:15:09.943Z
Modified
2026-04-10T04:22:16.495722Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In Liferay Portal before 7.3.2 and Liferay DXP 7.0 before fix pack 92, 7.1 before fix pack 18, and 7.2 before fix pack 6, the template API does not restrict user access to sensitive objects, which allows remote authenticated users to execute arbitrary code via crafted FreeMarker and Velocity templates.

References

Affected packages

Git / github.com/liferay/liferay-portal

Affected ranges

Type
GIT
Repo
https://github.com/liferay/liferay-portal
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "7.1-ga1"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "7.1-ga2"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "7.1-ga3"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "7.1.1-ga2"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "7.2-ga1"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "7.3-ga1"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "7.3-ga2"
        }
    ]
}

Affected versions

6.*
6.1.0-b1
6.1.0-b2
6.1.0-b3
6.1.0-b4
6.1.0-rc1
6.2.0-b1
6.2.0-b2
6.2.0-m2
6.2.0-m3
6.2.0-m4
6.2.0-m5
6.2.0-m6
7.*
7.0.0-m1
7.0.0-m2
7.0.0-m3
7.0.0-m4
7.0.0-m5
7.1.0-a1
7.1.0-a2
7.1.0-b1
7.1.0-b2
7.1.0-ga1
7.1.0-m1
7.1.0-m2
7.1.0-rc1
7.1.1-ga2
7.1.2-ga3
7.1.3-ga4
7.2.0-a1
7.2.0-b1
7.2.0-b2
7.2.0-b3
7.2.0-ga1
7.2.0-m2
7.2.0-rc2
7.2.0-rc3
7.2.1-ga2
7.3.0-ga1
7.3.1-ga2
7.3.2-ga3
sync-3.*
sync-3.0.0-b1
sync-3.0.1-b2
sync-3.0.10-ga2
sync-3.0.2-b3
sync-3.0.3-b4
sync-3.0.4-b5
sync-3.0.5-b6
sync-3.0.6-b7
sync-3.0.7-b8
sync-3.0.8-b9
sync-3.0.9-ga1
sync-3.1.0-ga1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13445.json"