<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>Vulnerability in Liferay 6.2 CE GA2</title>
  <link rel="self" href="https://liferay.dev/c/message_boards/find_thread?p_l_id=119785294&amp;threadId=118834389" />
  <subtitle>Vulnerability in Liferay 6.2 CE GA2</subtitle>
  <id>https://liferay.dev/c/message_boards/find_thread?p_l_id=119785294&amp;threadId=118834389</id>
  <updated>2026-04-03T19:41:29Z</updated>
  <dc:date>2026-04-03T19:41:29Z</dc:date>
  <entry>
    <title>RE: Vulnerability in Liferay 6.2 CE GA2</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=119064026" />
    <author>
      <name>Fernando Fernandez</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=119064026</id>
    <updated>2020-04-29T07:48:28Z</updated>
    <published>2020-04-29T07:48:28Z</published>
    <summary type="html">Dominik Marks has an excellent blog article on this: &lt;a href="https://liferay.dev/blogs/-/blogs/creating-liferay-security-binary-patches"&gt;https://liferay.dev/blogs/-/blogs/creating-liferay-security-binary-patches&lt;/a&gt;</summary>
    <dc:creator>Fernando Fernandez</dc:creator>
    <dc:date>2020-04-29T07:48:28Z</dc:date>
  </entry>
  <entry>
    <title>RE: Vulnerability in Liferay 6.2 CE GA2</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118892766" />
    <author>
      <name>Alberto Chaparro</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118892766</id>
    <updated>2020-04-09T16:49:35Z</updated>
    <published>2020-04-09T16:49:35Z</published>
    <summary type="html">Hi Saurabh,You can access the JSON services by the following URL:&lt;br /&gt;&lt;a href="http://localhost:8080/api/jsonws"&gt;http://localhost:8080/api/jsonws&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;We can&amp;#39;t provide the steps to reproduce due to security reasons, contact Support if you have the EE version.&lt;br /&gt;I hope this helps.</summary>
    <dc:creator>Alberto Chaparro</dc:creator>
    <dc:date>2020-04-09T16:49:35Z</dc:date>
  </entry>
  <entry>
    <title>RE: Vulnerability in Liferay 6.2 CE GA2</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118855626" />
    <author>
      <name>Saurabh Khandelwal</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118855626</id>
    <updated>2020-04-03T12:13:51Z</updated>
    <published>2020-04-03T12:13:51Z</published>
    <summary type="html">I have add the Patch related to the JSON WebService for &amp;#34;vulnerability CVE-2020-7961&amp;#34; issue in Liferay 6.2 GA2.&lt;br /&gt; How can I test whether issue is resolved? Is there any  JSON webservice API  request by which i can test. </summary>
    <dc:creator>Saurabh Khandelwal</dc:creator>
    <dc:date>2020-04-03T12:13:51Z</dc:date>
  </entry>
  <entry>
    <title>RE: Vulnerability in Liferay 6.2 CE GA2</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118840208" />
    <author>
      <name>Christoph Rabel</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118840208</id>
    <updated>2020-04-01T08:54:58Z</updated>
    <published>2020-04-01T08:54:58Z</published>
    <summary type="html">I am not sure, which classes are affected.&lt;br /&gt;AFAIK the issue can be exploited only through the /api/jsonws/ services. So, what we did, when the issue was revealed, we blocked access to that path on the reverse proxy till we could apply a patch. Please note that this can have some side effects, since some services simple are not available anymore. e.g.  categorization/tagging of content wasn&amp;#39;t possible anymore afterwards.&lt;br /&gt;Then we allowed specific IPs to access that url to allow the editors to do their work.&lt;br /&gt;I guess, you could be able to do something similar. If these external IPs do not need any of the affected services (most don&amp;#39;t need /api/jsonws), you could simple block access to them from the outside.</summary>
    <dc:creator>Christoph Rabel</dc:creator>
    <dc:date>2020-04-01T08:54:58Z</dc:date>
  </entry>
  <entry>
    <title>RE: Vulnerability in Liferay 6.2 CE GA2</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118835736" />
    <author>
      <name>Saurabh Khandelwal</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118835736</id>
    <updated>2020-03-31T15:04:00Z</updated>
    <published>2020-03-31T15:04:00Z</published>
    <summary type="html">Our Liferay version is Liferay 6.2 GA2 and the patch is available for GA6. So We are planning to check if any of the classes in the below packages (which are used for Webservices) are present in the patch.&lt;br /&gt;- portal-impl/src/com/liferay/portal/json/&lt;br /&gt;- portal-impl/src/com/liferay/portal/jsonwebservice&lt;br /&gt;If a class is present we will have to modify that class as per the changes in the patch.&lt;br /&gt;Also in our case the Webservices are accessible only from our select Servers as mentioned below so this could be another level of safety.</summary>
    <dc:creator>Saurabh Khandelwal</dc:creator>
    <dc:date>2020-03-31T15:04:00Z</dc:date>
  </entry>
  <entry>
    <title>RE: Vulnerability in Liferay 6.2 CE GA2</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118834761" />
    <author>
      <name>Saurabh Khandelwal</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118834761</id>
    <updated>2020-03-31T13:06:44Z</updated>
    <published>2020-03-31T13:06:44Z</published>
    <summary type="html">Thanks &lt;strong&gt;Olaf Kock&lt;/strong&gt; for quick reply.&lt;br /&gt;But one thing is, we have restricted our Webservices to specific IPs , So is there any chances of unwanted (outsider IPs) attack through JSON Webservices  as mentioned in &amp;#34;vulnerability CVE-2020-7961&amp;#34;&lt;br /&gt;And Upgrading to GA6 would be a big task for us!</summary>
    <dc:creator>Saurabh Khandelwal</dc:creator>
    <dc:date>2020-03-31T13:06:44Z</dc:date>
  </entry>
  <entry>
    <title>RE: Vulnerability in Liferay 6.2 CE GA2</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118831602" />
    <author>
      <name>Olaf Kock</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118831602</id>
    <updated>2020-03-31T12:44:26Z</updated>
    <published>2020-03-31T12:44:26Z</published>
    <summary type="html">&lt;div class="quote-title"&gt;Saurabh Khandelwal:&lt;/div&gt;&lt;blockquote&gt;&lt;br /&gt;# So my Questions are: 1. Should I apply patch for  My Liferay 6.2 CE GA2 instance? If Yes then how to apply patch? as the patch is only available for 6.2 GA6.&lt;br /&gt;2. And If applied the patch then how to test it?&lt;br /&gt;&lt;/blockquote&gt;The patch is for GA6, so you can&amp;#39;t apply it to GA2. You should upgrade to GA6, then apply the patch. There are more issues (potentially security issues as well(?)) fixed in GA versions, and you should always be on the latest GA. Up until 7.2 typically no new features were introduced in newer GAs, just issues fixed. And often, the release of a new major version also means the end of updates for earlier major versions (with notable exceptions like this patch).&lt;br /&gt;An alternative is to look at the patched components, and what changed between GA2 and GA6 to validate if you&amp;#39;re in a situation where the patch indeed hits classes that were unchanged between GA2 and 6. But that&amp;#39;s never been tested, it&amp;#39;s comparable with looking at the changed code, then backporting the change to your version.</summary>
    <dc:creator>Olaf Kock</dc:creator>
    <dc:date>2020-03-31T12:44:26Z</dc:date>
  </entry>
  <entry>
    <title>Vulnerability in Liferay 6.2 CE GA2</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118834388" />
    <author>
      <name>Saurabh Khandelwal</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=118834388</id>
    <updated>2020-03-31T12:39:05Z</updated>
    <published>2020-03-31T12:39:05Z</published>
    <summary type="html">Hello All,&lt;br /&gt;I&amp;#39;m using Liferay 6.2 CE GA2.I got the notification regarding a vulnerability CVE-2020-7961 could be affected  to Liferay System .&lt;br /&gt;- Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).&lt;br /&gt;With Reference URL:&lt;ul style="list-style: disc outside;"&gt;&lt;li&gt;&lt;a href="https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271"&gt;CONFIRM:https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://portal.liferay.dev/learn/security/known-vulnerabilities"&gt;MISC:https://portal.liferay.dev/learn/security/known-vulnerabilities&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;# So my Questions are: &lt;br /&gt;1. Should I apply patch for  My Liferay 6.2 CE GA2 instance? If Yes then how to apply patch? as the patch is only available for 6.2 GA6.&lt;br /&gt;[&lt;a href="https://github.com/community-security-team/liferay-portal/compare/6.2.5-ga6...6.2.5-cumulative.patch"&gt;https://github.com/community-security-team/liferay-portal/compare/6.2.5-ga6...6.2.5-cumulative.patch&lt;/a&gt;]&lt;br /&gt;2. And If applied the patch then how to test it?</summary>
    <dc:creator>Saurabh Khandelwal</dc:creator>
    <dc:date>2020-03-31T12:39:05Z</dc:date>
  </entry>
</feed>
