Overview
- Description
- TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions failing to properly parse, sanitize and encode malicious rich-text content, the content rendering process in the website frontend is vulnerable to cross-site scripting. Corresponding rendering instructions via TypoScript functionality HTMLparser does not consider all potentially malicious HTML tag & attribute combinations per default. In default scenarios, a valid backend user account is needed to exploit this vulnerability. In case custom plugins used in the website frontend accept and reflect rich-text content submitted by users, no authentication is required. Update to TYPO3 versions 7.6.53 ELTS, 8.7.42 ELTS, 9.5.29, 10.4.19, 11.3.2 that fix the problem described.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*", "vulnerable": true, "matchCriteriaId": "62943057-9B6F-4931-AC81-122F81675224", "versionEndIncluding": "7.6.52", "versionStartIncluding": "7.0.0" }, { "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*", "vulnerable": true, "matchCriteriaId": "15152F24-9A5D-45DD-8E20-9EDE1164A769", "versionEndIncluding": "8.7.41", "versionStartIncluding": "8.0.0" }, { "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B8EC2D0-D2D7-4512-8B9B-946186B03111", "versionEndIncluding": "9.5.28", "versionStartIncluding": "9.0.0" }, { "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9ECFF0F-AF27-4F7E-9E4D-847B7511BC5C", "versionEndIncluding": "10.4.18", "versionStartIncluding": "10.0.0" }, { "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B274A76-C202-4115-BD26-1A72B534E935", "versionEndIncluding": "11.3.1", "versionStartIncluding": "11.0.0" } ], "operator": "OR" } ] } ]