Lucene search

K
cve[email protected]CVE-2024-25120
HistoryFeb 13, 2024 - 11:15 p.m.

CVE-2024-25120

2024-02-1323:15:08
CWE-284
CWE-200
web.nvd.nist.gov
25
typo3
cve-2024-25120
uri scheme
access control bypass
php
gnu gpl
web content management
security vulnerability

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.3%

TYPO3 is an open source PHP based web content management system released under the GNU GPL. The TYPO3-specific t3:// URI scheme could be used to access resources outside of the users’ permission scope. This encompassed files, folders, pages, and records (although only if a valid link-handling configuration was provided). Exploiting this vulnerability requires a valid backend user account. Users are advised to update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described. There are no known workarounds for this issue.

Affected configurations

Vulners
Node
typo3typo3Range13.0.013.0.1
OR
typo3typo3Range12.0.012.4.11
OR
typo3typo3Range11.0.011.5.35
OR
typo3typo3Range10.0.010.4.43
OR
typo3typo3Range9.0.09.5.46
OR
typo3typo3Range8.0.08.7.57
VendorProductVersionCPE
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "TYPO3",
    "product": "typo3",
    "versions": [
      {
        "version": ">= 13.0.0, < 13.0.1",
        "status": "affected"
      },
      {
        "version": ">= 12.0.0, < 12.4.11",
        "status": "affected"
      },
      {
        "version": ">= 11.0.0, < 11.5.35",
        "status": "affected"
      },
      {
        "version": ">= 10.0.0, < 10.4.43",
        "status": "affected"
      },
      {
        "version": ">= 9.0.0, < 9.5.46",
        "status": "affected"
      },
      {
        "version": ">= 8.0.0, < 8.7.57",
        "status": "affected"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.3%