
Cloud Vulnerability DB
A community-led vulnerabilities database
HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 service pack 3, 7.2 fix pack 15 through 18, and older unsupported versions can be circumvented by using two forward slashes, which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect' parameter (2) 'FORWARD_URL' parameter, and (3) others parameters that rely on HtmlUtil.escapeRedirect. This vulnerability is the result of an incomplete fix in CVE-2022-28977 (Liferay Advisory).
The vulnerability is classified as an URL Redirection to Untrusted Site ('Open Redirect') vulnerability (CWE-601). It has been assigned a CVSS v3.1 base score of 6.1 MEDIUM (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N), indicating that it can be exploited remotely with low attack complexity and requires no privileges, though user interaction is required (NVD).
The vulnerability allows remote attackers to redirect users to arbitrary external URLs through various parameters that rely on HtmlUtil.escapeRedirect. This could potentially be used in phishing attacks or other malicious redirections (Liferay Advisory).
Fixed versions have been released to address this vulnerability: Liferay Portal 7.4.3.13, Liferay DXP 7.4 update 9, Liferay DXP 7.3 update 4, and Liferay DXP 7.2 fix pack 19. Users are advised to upgrade to these versions to mitigate the vulnerability (Liferay Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."