4.0.186
7 years ago
5 months ago
Known vulnerabilities in the com.liferay:com.liferay.dynamic.data.mapping.form.web package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
com.liferay:com.liferay.dynamic.data.mapping.form.web is a Liferay Dynamic Data Mapping Form Web. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through the lack of temporary file deletions in the forms upload field. An attacker can exhaust system resources by uploading an unlimited number of files, potentially leading to service disruption. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | [,4.0.180) |
com.liferay:com.liferay.dynamic.data.mapping.form.web is a Liferay Dynamic Data Mapping Form Web. Affected versions of this package are vulnerable to Arbitrary File Upload via the How to fix Arbitrary File Upload? Upgrade | [,4.0.180) |
com.liferay:com.liferay.dynamic.data.mapping.form.web is a Liferay Dynamic Data Mapping Form Web. Affected versions of this package are vulnerable to Files or Directories Accessible to External Parties via the How to fix Files or Directories Accessible to External Parties? Upgrade | [,4.0.180) |
com.liferay:com.liferay.dynamic.data.mapping.form.web is a Liferay Dynamic Data Mapping Form Web. Affected versions of this package are vulnerable to Uninitialized Memory Exposure due to insufficient permission checks in the How to fix Uninitialized Memory Exposure? Upgrade | [,4.0.174) |
com.liferay:com.liferay.dynamic.data.mapping.form.web is a Liferay Dynamic Data Mapping Form Web. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in Form widget configuration allowing remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a form's How to fix Cross-site Scripting (XSS)? Upgrade | [,3.0.6) |
com.liferay:com.liferay.dynamic.data.mapping.form.web is a Liferay Dynamic Data Mapping Form Web. Affected versions of this package are vulnerable to Information Exposure due to insecure direct object reference (IDOR), accessible via the Dynamic Data Mapping module's How to fix Information Exposure? Upgrade | [,4.0.55) |
com.liferay:com.liferay.dynamic.data.mapping.form.web is a Liferay Dynamic Data Mapping Form Web. Affected versions of this package are vulnerable to Improper Authorization. It autosaves form values for unauthenticated users, which allows remote attackers to view the autosaved values by viewing the form as an unauthenticated user. How to fix Improper Authorization? Upgrade | [,3.0.23) |
com.liferay:com.liferay.dynamic.data.mapping.form.web is a Liferay Dynamic Data Mapping Form Web. Affected versions of this package are vulnerable to Improper Authorization. It does not properly check user permissions, which allows remote attackers with How to fix Improper Authorization? Upgrade | [,3.0.21) |