{"id":"CVE-2020-7961","details":"Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).","aliases":["GHSA-w7pm-cc4v-f3g8"],"modified":"2026-04-11T23:12:47.992343Z","published":"2020-03-20T19:15:12.737Z","references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-7961"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/157254/Liferay-Portal-Java-Unmarshalling-Remote-Code-Execution.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/158392/Liferay-Portal-Remote-Code-Execution.html"},{"type":"ADVISORY","url":"https://portal.liferay.dev/learn/security/known-vulnerabilities"},{"type":"ADVISORY","url":"https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271"},{"type":"EVIDENCE","url":"https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/liferay/liferay-portal","events":[{"introduced":"0"},{"fixed":"ded0e9390637985231e962e4ad4cfa4639eabb26"}],"database_specific":{"cpe":"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"7.2.1"}],"source":"CPE_FIELD"}}],"versions":["6.1.0-b1","6.1.0-b2","6.1.0-b3","6.1.0-b4","6.1.0-rc1","6.2.0-b1","6.2.0-b2","6.2.0-m2","6.2.0-m3","6.2.0-m4","6.2.0-m5","6.2.0-m6","7.0.0-m1","7.0.0-m2","7.0.0-m3","7.0.0-m4","7.0.0-m5","7.1.0-a1","7.1.0-a2","7.1.0-b1","7.1.0-b2","7.1.0-m1","7.1.0-m2","7.2.0-a1","7.2.0-b1","7.2.0-b2","7.2.0-b3","7.2.0-ga1","7.2.0-m2","7.2.0-rc2","7.2.0-rc3","sync-3.0.0-b1","sync-3.0.1-b2","sync-3.0.10-ga2","sync-3.0.2-b3","sync-3.0.3-b4","sync-3.0.4-b5","sync-3.0.5-b6","sync-3.0.6-b7","sync-3.0.7-b8","sync-3.0.8-b9","sync-3.0.9-ga1","sync-3.1.0-ga1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-7961.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}