8.8
CVE-2022-42121
- EPSS 0.46%
- Published 15.11.2022 01:15:12
- Last modified 05.09.2025 18:15:36
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
A SQL injection vulnerability in the Layout module in Liferay Portal 7.1.3 through 7.4.3.4, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, 7.3 before service pack 3, and 7.4 GA allows remote authenticated attackers to execute arbitrary SQL commands via a crafted payload injected into a page template's 'Name' field.
Data is provided by the National Vulnerability Database (NVD)
Liferay ≫ Liferay Portal Version >= 7.1.3 <= 7.4.3.4
Liferay ≫ Digital Experience Platform Version7.1 Update-
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_1
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_10
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_11
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_12
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_13
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_14
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_15
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_16
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_17
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_18
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_19
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_2
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_20
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_21
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_22
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_23
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_24
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_25
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_3
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_4
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_5
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_6
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_7
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_8
Liferay ≫ Digital Experience Platform Version7.1 Updatefix_pack_9
Liferay ≫ Digital Experience Platform Version7.2 Update-
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_1
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_10
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_11
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_12
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_13
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_14
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_15
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_2
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_3
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_4
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_5
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_6
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_7
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_8
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_9
Liferay ≫ Liferay Portal Version >= 7.1.0 <= 7.4.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.46% | 0.633 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.