LPS-51061 HTTP host header manipulation

Description

The portal is vulnerable to HTTP host header attacks. This vulnerability can be used for web cache poisoning or for password reset poisoning.

Severity

Severity 1

Fixed Version(s)

Note that there are two binary patches which fix both LPS-51061 (this report) and LPS-51094, as well as all previous CST fixes for this release. You only need to apply one of these, not both.

  • Binary Patch 1: The "complete" patch is a patch which merges the fixes for LPS-51061 (this report) and LPS-51094 into the original Liferay JAR files, which you can use to overwrite the existing .JAR files in your Liferay deployment. See the README file on SourceForge for more details. This patch is used in cases where classloading issues prevent proper deployment of EXT plugins, such as GlassFish.
  • Binary Patch 2: The "diff" patch - this is an ordinary binary EXT-based patch (using ext-XXXXX.jar) like those previously issued by the CST and can be applied to most deployments. If you've successfully applied CST patches in the past, then this is the patch for you.
  • Source Patch: Details for working with source patches can be found on the Patching Liferay Portal page.

After applying this patch, please review the property 'virtual.hosts.valid.hosts' in portal.properties and ensure that only valid virtual hosts are listed.

Acknowledgments

This issue was discovered and reported by Andrew Smith

Publication date: Tue, 11 Nov 2014 20:06:00 +0000

Security advisories for Liferay's enterprise offerings (e.g., Liferay DXP) are only listed here since 2023. Historial advisories are availabe in the Help Center.