CVE-2024-25606
📋 TL;DR
This XXE vulnerability in Liferay Portal and DXP allows authenticated attackers with deployment permissions to read sensitive files or cause denial of service through XML parsing. It affects administrators and developers who can deploy portlets, widgets, or extensions.
💻 Affected Systems
- Liferay Portal
- Liferay DXP
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive system files, configuration files, or internal network resources, potentially leading to full system compromise.
Likely Case
Unauthorized file disclosure of application configuration, user data, or system information accessible to the application server.
If Mitigated
Limited impact if proper access controls restrict deployment permissions to trusted administrators only.
🎯 Exploit Status
Requires authenticated access with specific deployment permissions
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Liferay Portal 7.4.3.8+, Liferay DXP 7.4 update 4+, 7.3 update 12+, 7.2 fix pack 20+
Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25606
Restart Required: Yes
Instructions:
1. Download appropriate patch from Liferay customer portal. 2. Apply patch following Liferay's patching documentation. 3. Restart Liferay instance. 4. Verify version is updated.
🔧 Temporary Workarounds
Restrict deployment permissions
allLimit who can deploy widgets/portlets/extensions to only essential administrators
Disable XML external entity processing
allConfigure XML parsers to disable external entity resolution
🧯 If You Can't Patch
- Implement strict access controls to limit deployment permissions to trusted administrators only
- Monitor deployment activities and audit logs for suspicious XML processing attempts
🔍 How to Verify
Check if Vulnerable:
Check Liferay version via Control Panel → Configuration → Server Administration → System Information
Check Version:
Check via Liferay Control Panel or examine liferay-portal.xml version property
Verify Fix Applied:
Verify version is updated to patched version and test XML processing functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual XML parsing errors
- File access attempts via XML parsing
- Multiple deployment attempts by single user
Network Indicators:
- XML payloads with external entity references in deployment requests
SIEM Query:
source="liferay" AND (message="*XML*" OR message="*deploy*" OR message="*parse*")