Vulnerabilities > CVE-2011-1571 - Remote Security vulnerability in Liferay Portal
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Unspecified vulnerability in the XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote attackers to execute arbitrary commands via unknown vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Liferay XSL - Command Execution. CVE-2011-1571. Webapps exploits for multiple platform |
id | EDB-ID:18715 |
last seen | 2016-02-02 |
modified | 2012-04-08 |
published | 2012-04-08 |
reporter | Spencer McIntyre |
source | https://www.exploit-db.com/download/18715/ |
title | Liferay XSL - Command Execution |
Nessus
NASL family | CGI abuses |
NASL id | LIFERAY_6_0_6.NASL |
description | According to its self-reported version number, the installation of Liferay Portal hosted on the remote web server is affected by multiple vulnerabilities : - An arbitrary file download vulnerability exists when Apache Tomcat is used, which allows remote, authenticated users to download arbitrary files via an entity declaration in conjunction with an entity reference, related to an XML External Entity (aka XXE) issue. (CVE-2011-1502) - An arbitrary file download vulnerability exists when Apache Tomcat or Oracle GlassFish is used. The XSL Content portlet allows remote, authenticated users to read arbitrary XSL / XML files via a file:/// URL. (CVE-2011-1503) - A cross-site scripting vulnerability exists, which allows remote, authenticated users to inject arbitrary JavaScript or HTML via a blog title. (CVE-2011-1504) - A cross-site scripting vulnerability exists when Apache Tomcat is used, which allows remote, authenticated users to inject arbitrary JavaScript or HTML via a message title. (CVE-2011-1570) - An unspecified vulnerability exists when Apache Tomcat is used. The XSL Content portlet allows remote attackers to execute arbitrary commands via unknown vectors. (CVE-2011-1571) Note that Nessus has not tested for these issues but has instead relied only on the application |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 59230 |
published | 2012-05-22 |
reporter | This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/59230 |
title | Liferay Portal < 6.0.6 Multiple Vulnerabilities |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/111651/liferay_xsl.rb.txt |
id | PACKETSTORM:111651 |
last seen | 2016-12-05 |
published | 2012-04-07 |
reporter | Nicolas Gregoire |
source | https://packetstormsecurity.com/files/111651/Liferay-XSL-Command-Execution.html |
title | Liferay XSL Command Execution |