Skip to content

Commit 6927abe

Browse files
1 parent 0a83bdf commit 6927abe

File tree

3 files changed

+141
-10
lines changed

3 files changed

+141
-10
lines changed

advisories/unreviewed/2025/12/GHSA-m5gv-vj3f-6v2p/GHSA-m5gv-vj3f-6v2p.json renamed to advisories/github-reviewed/2025/12/GHSA-m5gv-vj3f-6v2p/GHSA-m5gv-vj3f-6v2p.json

Lines changed: 46 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m5gv-vj3f-6v2p",
4-
"modified": "2025-12-12T21:31:30Z",
4+
"modified": "2025-12-12T22:12:32Z",
55
"published": "2025-12-12T21:31:30Z",
66
"aliases": [
77
"CVE-2025-3586"
88
],
9+
"summary": "Liferay Portal and DXP Instance Admin can execute code using Objects Actions and Validations",
910
"details": "In Liferay Portal 7.4.3.27 through 7.4.3.42, and Liferay DXP 2024.Q1.1 through 2024.Q1.20, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 27 through update 42 (Liferay PaaS, and Liferay Self-Hosted), the Objects module does not restrict the use of Groovy scripts in Object actions for Admin Users. This allows remote authenticated admin users with the Instance Administrator role to execute arbitrary Groovy scripts (i.e., remote code execution) through Object actions. \n\nIn contrast, in Liferay DXP (Liferay SaaS), the use of Groovy in Object actions is not allowed due to the high security risks it poses. \n\nStarting from Liferay DXP 2024.Q2 and later, a new feature has been introduced in Instance Settings that allows administrators to configure whether Groovy scripts are allowed in their instances.",
1011
"severity": [
1112
{
@@ -14,15 +15,55 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Maven",
25+
"name": "com.liferay:com.liferay.object.service"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"fixed": "1.0.96"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
2445
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3586"
2546
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/liferay/liferay-portal/commit/3b9e3bb1462ccd33ede05f73f45b38b8262f018f"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/liferay/liferay-portal/commit/79ddc243e60864c0c30cfccb1cc46e705e922cb0"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/liferay/liferay-portal/commit/b2aa19be228fb308ebe8ae1f47d3224e1fd06225"
58+
},
59+
{
60+
"type": "PACKAGE",
61+
"url": "https://github.com/liferay/liferay-portal"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://liferay.atlassian.net/browse/LPE-17586"
66+
},
2667
{
2768
"type": "WEB",
2869
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-3586"
@@ -33,8 +74,8 @@
3374
"CWE-863"
3475
],
3576
"severity": "HIGH",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
77+
"github_reviewed": true,
78+
"github_reviewed_at": "2025-12-12T22:12:32Z",
3879
"nvd_published_at": "2025-09-01T18:15:29Z"
3980
}
4081
}
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vx9q-rhv9-3jvg",
4+
"modified": "2025-12-12T22:12:22Z",
5+
"published": "2025-12-12T22:12:22Z",
6+
"aliases": [
7+
"CVE-2025-67721"
8+
],
9+
"summary": "aircompressor Snappy and LZ4 Java-based decompressor implementation can leak information from reused output buffer",
10+
"details": "### Summary\nIncorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allows remote attackers to read previous buffer contents via crafted compressed input. In applications where the output buffer is reused without being cleared, this may lead to disclosure of sensitive data.\n\n### Details\nWith certain crafted compressed inputs, elements from the output buffer can end up in the uncompressed output. This is relevant for applications that reuse the same output buffer to uncompress multiple inputs. This can be the case of a web server that allocates a fix-sized buffer for performance purposes. This is similar to [GHSA-cmp6-m4wj-q63q](https://github.com/yawkat/lz4-java/security/advisories/GHSA-cmp6-m4wj-q63q).\n\n### Impact\nApplications using aircompressor as described above may leak sensitive information to external unauthorized attackers.\n\n### Mitigation\n\nThe vulnerability is fixed in release 3.4. However, it can be mitigated by either:\n* Avoiding reuse of the decompression buffer across calls\n* Clearing the decompression buffer before a call to decompress data",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "io.airlift:aircompressor-v3"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "3.4"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/airlift/aircompressor/security/advisories/GHSA-vx9q-rhv9-3jvg"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/airlift/aircompressor/commit/f2b489b398779b40c1ee29ddb11d7edef54ddc15"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/airlift/aircompressor/commit/ff12c4d5757c9d6d1de3d39a10402f1f84f9b765"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/airlift/aircompressor"
54+
}
55+
],
56+
"database_specific": {
57+
"cwe_ids": [
58+
"CWE-201"
59+
],
60+
"severity": "HIGH",
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-12-12T22:12:22Z",
63+
"nvd_published_at": null
64+
}
65+
}

advisories/unreviewed/2025/12/GHSA-x6mh-4w8x-p34v/GHSA-x6mh-4w8x-p34v.json renamed to advisories/github-reviewed/2025/12/GHSA-x6mh-4w8x-p34v/GHSA-x6mh-4w8x-p34v.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-x6mh-4w8x-p34v",
4-
"modified": "2025-12-12T21:31:37Z",
4+
"modified": "2025-12-12T22:13:22Z",
55
"published": "2025-12-12T18:30:35Z",
66
"aliases": [
77
"CVE-2025-65854"
88
],
9+
"summary": "MineAdmin has an insecure default password",
910
"details": "Insecure permissions in the scheduled tasks feature of MineAdmin v3.x allows attackers to execute arbitrary commands and execute a full account takeover.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "mineadmin/mineadmin"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "3.0.9"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -25,7 +46,11 @@
2546
},
2647
{
2748
"type": "WEB",
28-
"url": "https://www.mineadmin.com"
49+
"url": "https://github.com/mineadmin/mine-core/blob/7994da7f5cd0778eb9aadd550c50c259cc1d1048/src/Command/InstallProjectCommand.php#L123"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/mineadmin/mineadmin"
2954
},
3055
{
3156
"type": "WEB",
@@ -37,8 +62,8 @@
3762
"CWE-94"
3863
],
3964
"severity": "CRITICAL",
40-
"github_reviewed": false,
41-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2025-12-12T22:13:22Z",
4267
"nvd_published_at": "2025-12-12T16:15:44Z"
4368
}
4469
}

0 commit comments

Comments
 (0)