Lucene search

K
githubGitHub Advisory DatabaseGHSA-XGC2-Q928-27WV
HistoryMay 17, 2022 - 1:55 a.m.

TYPO3 Sensitive Information Disclosure via escapeStrForLike method

2022-05-1701:55:53
CWE-200
GitHub Advisory Database
github.com
5

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

6.6 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

79.8%

The escapeStrForLike method in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly escape input when the MySQL database is set to sql_mode NO_BACKSLASH_ESCAPES, which allows remote attackers to obtain sensitive information via wildcard characters in a LIKE query.

Affected configurations

Vulners
Node
typo3cms_poll_system_extensionRange<4.4.5
OR
typo3cms_poll_system_extensionRange<4.3.9
OR
typo3cms_poll_system_extensionRange<4.2.16

References

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

6.6 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

79.8%