CVE-2019-11444

HIGH

Liferay Portal CE 7.1.2 GA3 - Command Injection

Title source: llm

Description

An issue was discovered in Liferay Portal CE 7.1.2 GA3. An attacker can use Liferay's Groovy script console to execute OS commands. Commands can be executed via a [command].execute() call, as demonstrated by "def cmd =" in the ServerAdminPortlet_script value to group/control_panel/manage. Valid credentials for an application administrator user account are required. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to run groovy scripts and therefore not a design flaw

Exploits (1)

exploitdb WORKING POC
by AkkuS · rubywebappsmultiple
https://www.exploit-db.com/exploits/46525

Scores

CVSS v3 7.2
EPSS 0.4040
EPSS Percentile 97.4%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (1)
liferay/liferay_portal 7.1.2 ga3
Published Apr 22, 2019
Tracked Since Feb 18, 2026