Files
cve/2011/CVE-2011-1503.md

19 lines
828 B
Markdown
Raw Permalink Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2011-1503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1503)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
### POC
#### Reference
- http://issues.liferay.com/browse/LPS-13762
- http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952
#### Github
- https://github.com/starnightcyber/vul-info-collect