Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC2000D2-4B65-4EAF-B0D5-09DDC0255580", "versionEndExcluding": "7.4.3.4", "versionStartIncluding": "7.2.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459", "versionEndExcluding": "7.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*", "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*", "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*", "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*", "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*", "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*", "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*", "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*", "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*", "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*", "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*", "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*", "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*", "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*", "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*", "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*", "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*", "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*", "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*", "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*", "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F", "vulnerable": true}, {"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not escape user supplied data in the default notification email template, which allows remote authenticated users to inject arbitrary web script or HTML via the title of a calendar event or the user's name. This may lead to a content spoofing or cross-site scripting (XSS) attacks depending on the capability of the receiver's mail client."}, {"lang": "es", "value": "El m\u00f3dulo Calendario en Liferay Portal 7.2.0 a 7.4.2 y versiones anteriores no compatibles, y Liferay DXP 7.3 anteriores al service pack 3, 7.2 anteriores al fix pack 15 y versiones anteriores no compatibles no escapa a los datos proporcionados por el usuario en la plantilla de correo electr\u00f3nico de notificaci\u00f3n predeterminada , que permite a los usuarios autenticados remotamente inyectar script web o HTML arbitrarios a trav\u00e9s del t\u00edtulo de un evento del calendario o el nombre del usuario. Esto puede dar lugar a ataques de suplantaci\u00f3n de contenido o de Cross-site scripting (XSS), dependiendo de la capacidad del cliente de correo del receptor."}], "id": "CVE-2024-25151", "lastModified": "2025-01-28T02:28:11.500", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "security@liferay.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2024-02-21T04:15:08.627", "references": [{"source": "security@liferay.com", "tags": ["Vendor Advisory"], "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25151"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25151"}], "sourceIdentifier": "security@liferay.com", "vulnStatus": "Analyzed", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "security@liferay.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}