The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2011/04/08/5 | third party advisory mailing list |
http://openwall.com/lists/oss-security/2011/04/11/9 | third party advisory mailing list |
http://openwall.com/lists/oss-security/2011/03/29/1 | third party advisory mailing list |
http://issues.liferay.com/browse/LPS-13762 | issue tracking vendor advisory |
http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 | issue tracking release notes vendor advisory |