{"vulnerability": "cve-2023-3394", "sightings": [{"uuid": "b0114c42-e951-4ff7-867b-fba9b1639e19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33941", "type": "seen", "source": "https://t.me/cibsecurity/72412", "content": "\u203c CVE-2023-44311 \u203c\n\nMultiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T14:32:53.000000Z"}, {"uuid": "7d97fbf5-7e6e-47af-9bda-3391635e5622", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33949", "type": "seen", "source": "https://t.me/cibsecurity/64701", "content": "\u203c CVE-2023-33949 \u203c\n\nIn Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don't control. The portal property `company.security.strangers.verify` should be set to true.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T20:27:25.000000Z"}, {"uuid": "4a278255-e4ff-41f5-9742-bba09fe2602f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33948", "type": "seen", "source": "https://t.me/cibsecurity/64699", "content": "\u203c CVE-2023-33948 \u203c\n\nThe Dynamic Data Mapping module in Liferay Portal 7.4.3.67, and Liferay DXP 7.4 update 67 does not limit Document and Media files which can be downloaded from a Form, which allows remote attackers to download any file from Document and Media via a crafted URL.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T20:27:20.000000Z"}, {"uuid": "d5a3c5bd-5284-47bf-944a-23e934ccb10e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33945", "type": "seen", "source": "https://t.me/cibsecurity/64698", "content": "\u203c CVE-2023-33945 \u203c\n\nSQL injection vulnerability in the upgrade process for SQL Server in Liferay Portal 7.3.1 through 7.4.3.17, and Liferay DXP 7.3 before update 6, and 7.4 before update 18 allows attackers to execute arbitrary SQL commands via the name of a database table's primary key index. This vulnerability is only exploitable when chained with other attacks. To exploit this vulnerability, the attacker must modify the database and wait for the application to be upgraded.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T20:27:19.000000Z"}, {"uuid": "11608142-12d5-4a83-a476-ad0ba208cc8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33946", "type": "seen", "source": "https://t.me/cibsecurity/64696", "content": "\u203c CVE-2023-33946 \u203c\n\nThe Object module in Liferay Portal 7.4.3.4 through 7.4.3.48, and Liferay DXP 7.4 before update 49 does properly isolate objects in difference virtual instances, which allows remote authenticated users in one virtual instance to view objects in a different virtual instance via OAuth 2 scope administration page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T20:27:17.000000Z"}, {"uuid": "6c9fafb0-3362-402e-8eff-7fc5a489c08a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33945", "type": "seen", "source": "https://gist.github.com/alon710/09e853a4f1a857a57bb47496d0d66d57", "content": "", "creation_timestamp": "2026-01-24T22:41:06.000000Z"}, {"uuid": "5641e7e9-267a-4c24-9ff0-0da4327aa98e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33947", "type": "seen", "source": "https://t.me/cibsecurity/64694", "content": "\u203c CVE-2023-33947 \u203c\n\nThe Object module in Liferay Portal 7.4.3.4 through 7.4.3.60, and Liferay DXP 7.4 before update 61 does not segment object definition by virtual instance in search which allows remote authenticated users in one virtual instance to view object definition from a second virtual instance by searching for the object definition.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T20:27:12.000000Z"}, {"uuid": "b6a06f5d-0f97-4098-8aac-b08a5a774a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33944", "type": "seen", "source": "https://t.me/cibsecurity/64693", "content": "\u203c CVE-2023-33944 \u203c\n\nCross-site scripting (XSS) vulnerability in Layout module in Liferay Portal 7.3.4 through 7.4.3.68, and Liferay DXP 7.3 before update 24, and 7.4 before update 69 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a container type layout fragment's `URL` text field.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T20:27:11.000000Z"}, {"uuid": "2b66dfeb-de7e-4e46-a85f-01bfdd720421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33945", "type": "seen", "source": "https://gist.github.com/alon710/c1b09f233eebe20008884a2b246d9a46", "content": "", "creation_timestamp": "2026-01-24T21:25:41.000000Z"}]}