Known Vulnerabilities

The following vulnerabilities are known to exist in Liferay Portal CE.  Users of older releases are strongly encouraged to upgrade to the latest Liferay Portal CE release.  Patches are only produced for the latest Liferay Portal CE release.  Source code modifications may be possible on older releases, but care must be taken to backport fixes that may not apply to older releases.

To obtain source or binary patches for each of the vulnerabilities, click on the name of the vulnerability, and look for links for source and binary patches.  To obtain a single cumulative source or binary patch for all known vulnerabilities, visit the Patch Details section of the Reporting page.  Note that the availability of the single cumulative binary patch may lag a day or two behind availability of the associated source patches.

Back

LPS-47093 CVE-2014-0050 DoS using Apache Commons FileUpload

Date

Mon, 16 Jun 2014 15:18:00 +0000

Title

LPS-47093 CVE-2014-0050 DoS using Apache Commons FileUpload

Description

A security vulnerability in the Apache Commons FileUpload before 1.3.1 allows remote attackers to cause a denial of service by manipulating the request header.

In addition to patching Liferay Portal, you should also check if you are using a vulnerable version of Apache Commons FileUpload in other places. For example:

  • Application server/servlet container
  • Custom plugins and portlets
  • Liferay Faces portlets that utilize the following UI components:
    • bridge:inputFile (Liferay Faces Bridge)
    • p:fileUpload (PrimeFaces)
    • rich:fileUpload (RichFaces)

If one of the above is using a vulnerable version, you should update to the latest version of Apache Commons FileUpload. Alternatively, you may also update to the forked version of FileUpload that is included with the CST patch

For more information: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050

Severity

Severity 2

Workaround

See this thread for potential workarounds/mitigation steps.

Issue Links

Note that some or all of these may not yet be accessible. The CST remains committed to full disclosure of all security issues once fully resolved.

Patching Instructions

See the Community Security Team Process page for details on working with source and binary patches.

Binary Patch Links

Note: The below links point to a download page which contains multiple binary patches with the following naming scheme: <Liferay-Version>-security-<patch-version>.zip. Be sure to use the latest patch for your Liferay release!

Note: Binary patches only apply to the release with which this issue is associated. Applying a binary patch to any other release will probably result in a broken install!

Source Patch Links

Note that source patches only apply to the release with which this issue is associated. Applying a source patch to any other release will probably result in a broken install! For Github URLs suffixed with .patch, removing this suffix will yield a graphical view of the patch

Credit

This issue was reported to the Apache Software Foundation via JPCERT, and to Liferay via Samuel Kong