CVE-2022-42127: n/a in n/a
The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page.
AI Analysis
Technical Summary
CVE-2022-42127 is a medium-severity vulnerability affecting the Friendly URL module in Liferay Portal versions 7.4.3.5 through 7.4.3.36 and Liferay DXP 7.4 update 1 through 36. The vulnerability arises due to improper permission checks within the module, which allows remote attackers to access the history of all friendly URLs assigned to a page without requiring authentication or user interaction. Friendly URLs are human-readable web addresses that map to specific pages within the portal, and their history can reveal information about page restructuring, content changes, or internal site organization. The vulnerability is classified under CWE-276 (Incorrect Default Permissions), indicating a failure to enforce appropriate access controls. The CVSS 3.1 base score is 5.3 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to confidentiality (C:L) without affecting integrity or availability. No known exploits have been reported in the wild, and no patches or vendor advisories are linked in the provided data. This vulnerability does not allow modification or disruption of services but can lead to information disclosure that may aid attackers in reconnaissance or further attacks.
Potential Impact
For European organizations using affected versions of Liferay Portal or Liferay DXP, this vulnerability poses a risk of unauthorized information disclosure. The exposure of friendly URL history could reveal internal site structures, content changes, or sensitive navigation paths that might be leveraged by attackers for targeted phishing, social engineering, or to identify weak points in web applications. While the direct impact on confidentiality is limited, the information gained could facilitate more sophisticated attacks, especially against organizations with sensitive or regulated content. Since Liferay is widely used by enterprises, government agencies, and public sector organizations in Europe for content management and intranet portals, the risk is non-negligible. However, the lack of impact on integrity and availability reduces the immediate operational risk. The vulnerability's ease of exploitation (no authentication or user interaction required) increases its threat potential, particularly in environments exposed to the internet.
Mitigation Recommendations
European organizations should prioritize upgrading to Liferay Portal and Liferay DXP versions beyond 7.4.3.36 and update 36 respectively, where this vulnerability is addressed. In the absence of official patches, administrators should implement strict access controls at the web server or application firewall level to restrict access to the Friendly URL history endpoints. Monitoring and logging access to these URLs can help detect unauthorized attempts. Additionally, organizations should review and tighten permission settings within Liferay to ensure that sensitive modules and endpoints are not publicly accessible. Employing network segmentation to isolate management interfaces and applying web application firewalls (WAFs) with custom rules to block suspicious requests targeting friendly URL history can further reduce risk. Regular security assessments and penetration testing focusing on information disclosure vectors are recommended to identify residual exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Italy, Spain
CVE-2022-42127: n/a in n/a
Description
The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page.
AI-Powered Analysis
Technical Analysis
CVE-2022-42127 is a medium-severity vulnerability affecting the Friendly URL module in Liferay Portal versions 7.4.3.5 through 7.4.3.36 and Liferay DXP 7.4 update 1 through 36. The vulnerability arises due to improper permission checks within the module, which allows remote attackers to access the history of all friendly URLs assigned to a page without requiring authentication or user interaction. Friendly URLs are human-readable web addresses that map to specific pages within the portal, and their history can reveal information about page restructuring, content changes, or internal site organization. The vulnerability is classified under CWE-276 (Incorrect Default Permissions), indicating a failure to enforce appropriate access controls. The CVSS 3.1 base score is 5.3 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to confidentiality (C:L) without affecting integrity or availability. No known exploits have been reported in the wild, and no patches or vendor advisories are linked in the provided data. This vulnerability does not allow modification or disruption of services but can lead to information disclosure that may aid attackers in reconnaissance or further attacks.
Potential Impact
For European organizations using affected versions of Liferay Portal or Liferay DXP, this vulnerability poses a risk of unauthorized information disclosure. The exposure of friendly URL history could reveal internal site structures, content changes, or sensitive navigation paths that might be leveraged by attackers for targeted phishing, social engineering, or to identify weak points in web applications. While the direct impact on confidentiality is limited, the information gained could facilitate more sophisticated attacks, especially against organizations with sensitive or regulated content. Since Liferay is widely used by enterprises, government agencies, and public sector organizations in Europe for content management and intranet portals, the risk is non-negligible. However, the lack of impact on integrity and availability reduces the immediate operational risk. The vulnerability's ease of exploitation (no authentication or user interaction required) increases its threat potential, particularly in environments exposed to the internet.
Mitigation Recommendations
European organizations should prioritize upgrading to Liferay Portal and Liferay DXP versions beyond 7.4.3.36 and update 36 respectively, where this vulnerability is addressed. In the absence of official patches, administrators should implement strict access controls at the web server or application firewall level to restrict access to the Friendly URL history endpoints. Monitoring and logging access to these URLs can help detect unauthorized attempts. Additionally, organizations should review and tighten permission settings within Liferay to ensure that sensitive modules and endpoints are not publicly accessible. Employing network segmentation to isolate management interfaces and applying web application firewalls (WAFs) with custom rules to block suspicious requests targeting friendly URL history can further reduce risk. Regular security assessments and penetration testing focusing on information disclosure vectors are recommended to identify residual exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-03T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbee15c
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 6/25/2025, 6:45:37 AM
Last updated: 8/17/2025, 9:03:21 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.