
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2023-3426) affects the organization selector functionality in Liferay Portal versions 7.4.3.81 through 7.4.3.85 and Liferay DXP 7.4 updates 81 through 85. The vulnerability was discovered by security researcher 4rth4s and was published on August 2, 2023 (Liferay Advisory).
The vulnerability stems from a missing user permission check in the organization selector component. It has been assigned a CVSS v3.1 base score of 4.3 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. The vulnerability is classified under CWE-862 (Missing Authorization) and CWE-425 (Direct Request) (NVD Database).
When exploited, this vulnerability allows remote authenticated users to obtain a list of all organizations in the system, potentially exposing sensitive organizational structure information that should be restricted (Liferay Advisory).
The vulnerability has been fixed in Liferay Portal version 7.4.3.86 and Liferay DXP 7.4 update 86. Users are advised to upgrade to these versions or later to address the security issue (Liferay Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."