Show plain JSON{"id": "CVE-2020-28885", "cveTags": [{"tags": ["disputed"], "sourceIdentifier": "cve@mitre.org"}], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}]}, "published": "2022-01-28T12:15:07.960", "references": [{"url": "https://medium.com/%40tranpdanh/some-way-to-execute-os-command-in-liferay-portal-84498bde18d3", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "Liferay Portal Server tested on 7.3.5 GA6, 7.2.0 GA1 is affected by OS Command Injection. An administrator user can inject commands through the Gogo Shell module to execute any OS command on the Liferay Portal Sever. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to access and execute commands in Gogo Shell and therefore not a design fla"}, {"lang": "es", "value": "** EN DISPUTA ** Liferay Portal Server probado en versiones 7.3.5 GA6, 7.2.0 GA1, est\u00e1 afectado por la inyecci\u00f3n de comandos del Sistema Operativo. Un usuario administrador puede inyectar comandos mediante el m\u00f3dulo Gogo Shell para ejecutar cualquier comando del SO en el Liferay Portal Sever. NOTA: El desarrollador cuestiona esto como una vulnerabilidad, ya que es una funci\u00f3n para que los administradores accedan y ejecuten comandos en Gogo Shell y, por lo tanto, no es una falla de dise\u00f1o"}], "lastModified": "2024-05-17T01:47:32.960", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:liferay:liferay_portal:7.2:ga1:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "EE4E1281-8507-42CB-9330-7D4B23247164"}, {"criteria": "cpe:2.3:a:liferay:liferay_portal:7.3.5:ga6:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "C954CFAB-373F-4E6F-9DDD-DDACC0ED3353"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}