{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<ul> <li>Liferay Portal versions 7.4.x ant\u00e9rieures \u00e0 7.4 GA2 (7.4.1)</li> <li>Liferay Portal version 7.3.7 GA8 (7.3.7) sans le dernier correctif de s\u00e9curit\u00e9</li> <li>Liferay Portal version 7.2 GA2 (7.2.1) sans le dernier correctif de s\u00e9curit\u00e9</li> </ul> <p>Les versions 7.1.x de Liferay Portal ne b\u00e9n\u00e9ficient pas du correctif de s\u00e9curit\u00e9, l'\u00e9diteur conseille une mise \u00e0 niveau vers Liferay Portal version 7.2.1 avec le dernier correctif de s\u00e9curit\u00e9.</p> ","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-26595","url":"https://www.cve.org/CVERecord?id=CVE-2022-26595"},{"name":"CVE-2022-26596","url":"https://www.cve.org/CVERecord?id=CVE-2022-26596"}],"links":[],"reference":"CERTFR-2022-AVI-431","revisions":[{"description":"Version initiale","revision_date":"2022-05-10T00:00:00.000000"}],"risks":[{"description":"Injection de code indirecte \u00e0 distance (XSS)"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Liferay Portal.\nElles permettent \u00e0 un attaquant de provoquer une injection de code\nindirecte \u00e0 distance (XSS).\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Liferay Portal","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Liferay du 10 mai 2022","url":"https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26596-stored-xss-with-template-name"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Liferay du 24 janvier 2022","url":"https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26595-unauthorized-access-to-site-group-list"}]}
