7.5
CVE-2022-42124
- EPSS 0.59%
- Veröffentlicht 15.11.2022 01:15:13
- Zuletzt bearbeitet 05.09.2025 18:15:37
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the 'name' field of a layout prototype.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_10
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_11
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_12
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_13
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_14
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_15
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_16
Liferay ≫ Digital Experience Platform Version7.2 Updatefix_pack_9
Liferay ≫ Digital Experience Platform Version7.3 Update-
Liferay ≫ Digital Experience Platform Version7.4 Update-
Liferay ≫ Liferay Portal Version >= 7.3.2 < 7.4.3.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.59% | 0.683 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-1333 Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.