User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request's response time.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "7.3.7"
},
{
"introduced": "7.4.0"
},
{
"fixed": "7.4.3.27"
},
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_1"
},
{
"introduced": "0"
},
{
"last_affected": "7.2-service_pack_1"
},
{
"introduced": "0"
},
{
"last_affected": "7.3-fix_pack_1"
},
{
"introduced": "0"
},
{
"last_affected": "7.3-fix_pack_2"
},
{
"introduced": "0"
},
{
"last_affected": "7.3-service_pack_1"
},
{
"introduced": "0"
},
{
"last_affected": "7.3-service_pack_3"
},
{
"introduced": "0"
},
{
"last_affected": "7.3-update4"
},
{
"introduced": "0"
},
{
"last_affected": "7.3-update5"
},
{
"introduced": "0"
},
{
"last_affected": "7.3-update6"
},
{
"introduced": "0"
},
{
"last_affected": "7.3-update7"
},
{
"introduced": "0"
},
{
"last_affected": "7.4-update1"
},
{
"introduced": "0"
},
{
"last_affected": "7.4-update2"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_12"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_13"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_14"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_15"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_16"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_17"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_18"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_19"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-fix_pack_9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-service_pack_2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-service_pack_3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-service_pack_4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-service_pack_5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-service_pack_6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.2-service_pack_7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.3-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update12"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update13"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update14"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update15"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update16"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update17"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update18"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update19"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update20"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update21"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update22"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update23"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update24"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update25"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update26"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4-update9"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26268.json"