Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-28981: n/a in n/a

0
High
VulnerabilityCVE-2022-28981cvecve-2022-28981
Published: Thu Sep 22 2022 (09/22/2022, 00:06:35 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Path traversal vulnerability in the Hypermedia REST APIs module in Liferay Portal 7.4.0 through 7.4.2 allows remote attackers to access files outside of com.liferay.headless.discovery.web/META-INF/resources via the `parameter` parameter.

AI-Powered Analysis

AILast updated: 07/06/2025, 02:56:18 UTC

Technical Analysis

CVE-2022-28981 is a path traversal vulnerability identified in the Hypermedia REST APIs module of Liferay Portal versions 7.4.0 through 7.4.2. This vulnerability allows remote attackers to exploit the 'parameter' parameter to access files outside the intended directory scope, specifically outside of the com.liferay.headless.discovery.web/META-INF/resources directory. Path traversal (CWE-22) vulnerabilities occur when user-supplied input is not properly sanitized, enabling attackers to manipulate file paths and access arbitrary files on the server's filesystem. In this case, the vulnerability is remotely exploitable without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 7.5 (high severity) reflects the significant confidentiality impact, as attackers can read sensitive files, but no integrity or availability impact is noted. Although no known exploits are currently reported in the wild, the ease of exploitation and the potential to access sensitive configuration or data files pose a serious risk. Liferay Portal is a widely used enterprise web platform for building portals and websites, often deployed in corporate and public sector environments. The vulnerability could allow attackers to access sensitive information such as configuration files, credentials, or other protected resources, potentially leading to further compromise or data leakage.

Potential Impact

For European organizations, the impact of CVE-2022-28981 can be substantial, especially for those relying on Liferay Portal for critical web services, intranet portals, or customer-facing applications. Unauthorized access to sensitive files could expose confidential business data, user information, or internal configurations, leading to data breaches and compliance violations under regulations such as GDPR. The confidentiality breach could also facilitate lateral movement within networks or enable attackers to craft more sophisticated attacks. Since the vulnerability does not require authentication, any exposed Liferay Portal instance accessible over the internet is at risk, increasing the attack surface. Public sector organizations, financial institutions, and large enterprises in Europe that use Liferay Portal may face reputational damage and operational disruptions if exploited. Additionally, the lack of known patches or mitigations at the time of publication increases the urgency for organizations to implement compensating controls.

Mitigation Recommendations

To mitigate CVE-2022-28981, European organizations should first verify if they are running affected versions of Liferay Portal (7.4.0 to 7.4.2) and prioritize upgrading to a fixed version once available from the vendor. Until patches are released, organizations should implement strict network-level access controls to restrict access to the Liferay Portal REST API endpoints, especially the Hypermedia REST APIs module. Deploying Web Application Firewalls (WAFs) with custom rules to detect and block path traversal patterns in the 'parameter' parameter can provide temporary protection. Additionally, conducting thorough input validation and sanitization on all user-supplied parameters in custom Liferay modules can reduce risk. Monitoring logs for unusual file access attempts and scanning for exposed sensitive files on the server can help detect exploitation attempts early. Organizations should also review and minimize file permissions on the server to limit the impact of any unauthorized file access. Finally, maintaining an incident response plan that includes this vulnerability scenario will improve readiness in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-04-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835fd37182aa0cae21d8def

Added to database: 5/27/2025, 5:58:15 PM

Last enriched: 7/6/2025, 2:56:18 AM

Last updated: 2/7/2026, 2:15:26 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats