Lucene search

K
githubGitHub Advisory DatabaseGHSA-WP8J-C736-C5R3
HistoryMay 30, 2024 - 9:06 p.m.

TYPO3 Cross-Site Scripting Vulnerability Exploitable by Editors

2024-05-3021:06:13
CWE-79
GitHub Advisory Database
github.com
4
typo3
cross-site scripting
vulnerability
frontend
backend
filelist module
exploitable
editors
html
attributes
user account

6.1 Medium

AI Score

Confidence

High

It has been discovered that link tags generated by typolink functionality in the website’s frontend are vulnerable to cross-site scripting - values being assigned to HTML attributes have not been parsed correctly. A valid backend user account is needed to exploit this vulnerability.

As second and separate vulnerability in the filelist module of the backend user interface has been referenced with this advisory as well. Error messages being shown after using a malicious name for renaming a file are not propery encoded, thus vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.

Affected configurations

Vulners
Node
typo3cms_poll_system_extensionRange<7.3.1
OR
typo3cms_poll_system_extensionRange<6.2.14
CPENameOperatorVersion
typo3/cmslt7.3.1
typo3/cmslt6.2.14

6.1 Medium

AI Score

Confidence

High