Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2021-29040 | First vendor Publication | 2021-05-16 |
Vendor | Cve | Last vendor Modification | 2021-05-24 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N | |||
---|---|---|---|
Overall CVSS Score | 5.3 | ||
Base Score | 5.3 | Environmental Score | 5.3 |
impact SubScore | 1.4 | Temporal Score | 5.3 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | Low |
Integrity Impact | None | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The JSON web services in Liferay Portal 7.3.4 and earlier, and Liferay DXP 7.0 before fix pack 97, 7.1 before fix pack 20 and 7.2 before fix pack 10 may provide overly verbose error messages, which allows remote attackers to use the contents of error messages to help launch another, more focused attacks via crafted inputs. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29040 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-209 | Information Exposure Through an Error Message |
CPE : Common Platform Enumeration
Sources (Detail)
Source | Url |
---|---|
MISC | http://liferay.com https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publi... |
Alert History
Date | Informations |
---|---|
2023-04-26 02:09:16 |
|
2021-05-25 00:22:50 |
|
2021-05-18 05:22:47 |
|
2021-05-16 21:23:07 |
|