Lucene search

K
githubGitHub Advisory DatabaseGHSA-XJWX-78X7-Q6JC
HistoryMay 14, 2024 - 8:13 p.m.

TYPO3 vulnerable to an HTML Injection in the History Module

2024-05-1420:13:02
CWE-79
CWE-116
GitHub Advisory Database
github.com
5
typo3
html injection
history module
update
version 13.1.1
content-security-policy
adversaries
backend user account
security advisory

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

4.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Problem

The history backend module is vulnerable to HTML injection. Although Content-Security-Policy headers effectively prevent JavaScript execution, adversaries can still inject malicious HTML markup. Exploiting this vulnerability requires a valid backend user account.

Solution

Update to TYPO3 version 13.1.1 that fixes the problem described.

Credits

Thanks to TYPO3 core team member Andreas Kienast who reported this issue and to TYPO3 core & security team Benjamin Franzke who fixed the issue.

References

Affected configurations

Vulners
Node
typo3cms_poll_system_extensionRange13.1.0
CPENameOperatorVersion
typo3/cms-corele13.1.0

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

4.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%