Thu, 19 Mar 2015 18:38:00 +0000
LPS-54382 Insecure handling of authentication information in 6.2.2
This issue covers various issues in the way the portal handles authentication information in Liferay Portal 6.2 CE GA3 that are addressed by the CST patch, including:
- Passwords are transmitted to the user unnecessarily
- Browsers may save answers to reminder questions
Issue LinksNote that some or all of these may not yet be accessible. The CST remains committed to full disclosure of all security issues once fully resolved.
See the Community Security Team Process page for details on working with source and binary patches.
Binary Patch Links
Note: The below links point to a download page which contains multiple binary patches with the following naming scheme:
<patch-version>.zip. Be sure to use the latest patch for your Liferay release!
Note: Binary patches only apply to the release with which this issue is associated. Applying a binary patch to any other release will probably result in a broken install!
Source Patch Links
Note that source patches only apply to the release with which this issue is associated. Applying a source patch to any other release will probably result in a broken install! For Github URLs suffixed with
.patch, removing this suffix will yield a graphical view of the patch
Note that there are two binary patches which fix both LPS-51061 (this report) and LPS-51094, as well as all previous CST fixes for this release. You only need to apply one of these, not both.
- Link 1: The "complete" patch is a patch which merges the fixes for all reports into the original Liferay JAR files, which you can use to overwrite the existing .JAR files in your Liferay deployment. See the README file on SourceForge for more details. This patch is used in cases where classloading issues prevent proper deployment of EXT plugins, such as GlassFish.
- Link 2: The "diff" patch - this is an ordinary binary EXT-based patch (using
ext-XXXXX.jar) like those previously issued by the CST and can be applied to most deployments. If you've successfully applied CST patches in the past, then this is the patch for you.