{"api_version":"1","generated_at":"2026-04-23T02:37:45+00:00","cve":"CVE-2023-33950","urls":{"html":"https://cve.report/CVE-2023-33950","api":"https://cve.report/api/cve/CVE-2023-33950.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-33950","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-33950"},"summary":{"title":"CVE-2023-33950","description":"Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs.","state":"PUBLIC","assigner":"security@liferay.com","published_at":"2023-05-24 17:15:00","updated_at":"2023-05-31 20:22:00"},"problem_types":["CWE-1333"],"metrics":[],"references":[{"url":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33950","name":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33950","refsource":"MISC","tags":[],"title":"CVE-2023-33950 ReDoS vulnerability with Pattern Redirects - Liferay","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-33950","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33950","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"33950","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"liferay","cpe5":"digital_experience_platform","cpe6":"7.4","cpe7":"update48","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"33950","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"liferay","cpe5":"digital_experience_platform","cpe6":"7.4","cpe7":"update76","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"33950","vulnerable":"1","versionEndIncluding":"7.4.3.76","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"liferay","cpe5":"liferay_portal","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-33950","qid":"731007","title":"Liferay Portal Regular Expression Denial of Service (DoS) Vulnerability"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-33950","ASSIGNER":"security@liferay.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-1333 Inefficient Regular Expression Complexity","cweId":"CWE-1333"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Liferay","product":{"product_data":[{"product_name":"Portal","version":{"version_data":[{"version_affected":"<=","version_name":"7.4.3.48","version_value":"7.4.3.76"}]}},{"product_name":"DXP","version":{"version_data":[{"version_affected":"<=","version_name":"7.4.13.u48","version_value":"7.4.13.u76"}]}}]}}]}},"references":{"reference_data":[{"url":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33950","refsource":"MISC","name":"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33950"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-05-24 17:15:00","lastModifiedDate":"2023-05-31 20:22:00","problem_types":["CWE-1333"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.3.48","versionEndIncluding":"7.4.3.76","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}