ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the name field of a layout prototype.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Digital_experience_platform | Liferay | 7.2-fix_pack_10 (including) | 7.2-fix_pack_10 (including) |
Digital_experience_platform | Liferay | 7.2-fix_pack_11 (including) | 7.2-fix_pack_11 (including) |
Digital_experience_platform | Liferay | 7.2-fix_pack_12 (including) | 7.2-fix_pack_12 (including) |
Digital_experience_platform | Liferay | 7.2-fix_pack_13 (including) | 7.2-fix_pack_13 (including) |
Digital_experience_platform | Liferay | 7.2-fix_pack_14 (including) | 7.2-fix_pack_14 (including) |
Digital_experience_platform | Liferay | 7.2-fix_pack_15 (including) | 7.2-fix_pack_15 (including) |
Digital_experience_platform | Liferay | 7.2-fix_pack_16 (including) | 7.2-fix_pack_16 (including) |
Digital_experience_platform | Liferay | 7.2-fix_pack_9 (including) | 7.2-fix_pack_9 (including) |
Digital_experience_platform | Liferay | 7.3 (including) | 7.3 (including) |
Digital_experience_platform | Liferay | 7.4 (including) | 7.4 (including) |
Liferay_portal | Liferay | 7.3.2 (including) | 7.4.3.5 (excluding) |
Attackers can create crafted inputs that
intentionally cause the regular expression to use
excessive backtracking in a way that causes the CPU
consumption to spike.