Security

Back to Security Alert

ClamAV HFS+ Security Advisory: CVE-2023-20032

References:

Severity: Critical

Vulnerability Summary

A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.

Liferay PaaS customers and customers using DXP and Liferay Portal EE on their premises that installed and use ClamAV are urged to upgrade to version 1.0.1, 0.103.8 or 0.105.2. Customers that don’t use ClamAV are not impacted.

Liferay SaaS customers are protected.

What is the Concern?

CVE-2023-20032 is a Remote Code Execution vulnerability triggered when ClamAV scans a malicious file. Liferay products do not ship ClamAV software and are not vulnerable in the default installation.

Liferay DXP and Liferay Portal can be vulnerable when ClamAV is configured to scan Liferay DXP/Portal Document Library or to scan temporary folders (for example /tmp or <<tomcat>>/temp folders).

An attacker exploiting the vulnerability can have access to Liferay DXP/Portal files. There is a possibility depending on ClamAV operating system user privileges for the attacker to escalate access to obtain full control of the DXP/Portal installation.

How Can I Detect if I am Impacted?

Liferay SaaS customers are protected.

LXC PaaS customers should check their GitHub, BitBucket or GitLab repositories. They can also use Liferay Cloud Console Services to verify the Docker image version they are using. Optionally, they can use Shell access to verify the version of ClamAV.

On-premise customers can use OS commands to verify the running version of ClamAV:

  • clamscan --version
  • clamd --version

How Can I Mitigate My Exposure?

To minimize the impact, customers can configure ClamAV to be run on a separate server as described in Enabling Antivirus Scanning for Uploaded Files.

How Can I Upgrade ClamAV?

Liferay PaaS customers using ClamAV Docker image should fetch the latest version and build and deploy as any standard LXC-SM service.

Customers running ClamAV on their linux servers should use OS package managers or download and install software directly from https://www.clamav.net/downloads.

Questions?

Please contact Liferay Support or your Customer Success Manager for any additional information.

On this page