CVE-2024-26273

8.8 HIGH

📋 TL;DR

A CSRF vulnerability in Liferay Portal and DXP allows attackers to trick authenticated administrators into performing unauthorized actions. Attackers can change user passwords, shut down servers, execute arbitrary code, and perform other administrative functions. Affected versions include Liferay Portal 7.4.0-7.4.3.103 and multiple DXP versions.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.103; Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92, 7.3 update 29 through update 35
Operating Systems: All platforms running affected Liferay versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator session to exploit. The vulnerability is in the content page editor component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including arbitrary code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthorized administrative actions such as password changes, service disruption, or configuration modifications.

🟢

If Mitigated

Limited impact with proper CSRF protections, though some risk remains if other vulnerabilities are chained.

🌐 Internet-Facing: HIGH - Web applications are directly accessible and CSRF attacks can be delivered via malicious websites.
🏢 Internal Only: MEDIUM - Internal users could still be targeted via phishing or compromised internal sites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into visiting a malicious page. CSRF attacks are well-understood and easy to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Liferay Portal 7.4.3.104+, Liferay DXP 2023.Q4.3+, 2023.Q3.6+, 7.4 update 93+, 7.3 update 36+

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26273

Restart Required: Yes

Instructions:

1. Download the appropriate fix pack from Liferay's customer portal. 2. Backup your current installation. 3. Apply the fix pack following Liferay's deployment guide. 4. Restart the application server.

🔧 Temporary Workarounds

Enable CSRF Protection

all

Configure Liferay's built-in CSRF protection if not already enabled

Set portal.properties: csrf.token.enabled=true
Configure csrf.origin.whitelist appropriately

Restrict Administrative Access

all

Limit administrative access to trusted networks and implement additional authentication for sensitive actions

Configure firewall rules to restrict /group/control_panel access
Implement IP whitelisting for admin interfaces

🧯 If You Can't Patch

  • Implement network segmentation to isolate Liferay instances from critical systems
  • Deploy a WAF with CSRF protection rules and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Liferay version via Control Panel → Configuration → Server Administration → System Information

Check Version:

Check liferay.home/portal-ext.properties or Control Panel system information

Verify Fix Applied:

Verify version is updated to patched version and test CSRF protection functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative actions from unexpected IPs
  • Multiple failed login attempts followed by administrative actions
  • Requests with _com_liferay_commerce_catalog_web_internal_portlet_CommerceCatalogsPortlet_redirect parameter

Network Indicators:

  • HTTP POST requests to administrative endpoints with CSRF tokens missing or invalid
  • Requests from external domains to internal administrative interfaces

SIEM Query:

source="liferay.log" AND ("password change" OR "shutdown" OR "script console") AND NOT user_agent="browser_agent"

🔗 References

📤 Share & Export