Lucene search

K
cve[email protected]CVE-2022-36107
HistorySep 13, 2022 - 6:15 p.m.

CVE-2022-36107

2022-09-1318:15:15
CWE-79
web.nvd.nist.gov
44
7
typo3
filedumpcontroller
xss
vulnerability
backend
frontend
gnu gpl
elts
cve-2022-36107
nvd

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

24.9%

TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the FileDumpController (backend and frontend context) is vulnerable to cross-site scripting when malicious files are displayed using this component. A valid backend user account is needed to exploit this vulnerability. Update to TYPO3 version 7.6.58 ELTS, 8.7.48 ELTS, 9.5.37 ELTS, 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue.

Affected configurations

Vulners
NVD
Node
typo3typo3Range7.0.07.6.58
OR
typo3typo3Range8.0.08.7.48
OR
typo3typo3Range9.0.09.5.37
OR
typo3typo3Range10.0.010.4.32
OR
typo3typo3Range11.0.011.5.16
VendorProductVersionCPE
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "typo3",
    "vendor": "TYPO3",
    "versions": [
      {
        "status": "affected",
        "version": ">= 7.0.0, < 7.6.58"
      },
      {
        "status": "affected",
        "version": ">= 8.0.0, < 8.7.48"
      },
      {
        "status": "affected",
        "version": ">= 9.0.0, < 9.5.37"
      },
      {
        "status": "affected",
        "version": ">= 10.0.0, < 10.4.32"
      },
      {
        "status": "affected",
        "version": ">= 11.0.0, < 11.5.16"
      }
    ]
  }
]

Social References

More

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

24.9%