9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.1 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.4%
The version of TYPO3 installed on the remote host is 8.x prior to 8.7.25 or 9.x prior to 9.5.6. It is, therefore, affected by multiple vulnerabilities:
A remote code execution vulnerability exists in Typo3’s image processing functionality due to a failure to properly configure applications it delegates this to. An unauthenticated, remote attacker can exploit this to execute arbitrary commands on an affected host (CVE-2019-11832).
A cross-site scripting (XSS) vulnerability exists in the typo3/fluid package due to improper validation of user-supplied input before returning it to users. An unauthenticated, remote attacker can exploit this, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user’s browser session.
A session hijacking vulnerability exists in Typo3’s password change functionality due to a failure to properly clean up sessions. An authenticated, remote attacker can exploit this to perform actions in the user or administrator interface with the privileges of another user.
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(138797);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/05");
script_cve_id("CVE-2019-11832");
script_bugtraq_id(108305);
script_name(english:"TYPO3 8.x < 8.7.25 / 9.x < 9.5.6 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP script that is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of TYPO3 installed on the remote host is 8.x prior to 8.7.25 or 9.x prior to 9.5.6. It is, therefore,
affected by multiple vulnerabilities:
- A remote code execution vulnerability exists in Typo3's image processing functionality due to a failure to
properly configure applications it delegates this to. An unauthenticated, remote attacker can exploit this to
execute arbitrary commands on an affected host (CVE-2019-11832).
- A cross-site scripting (XSS) vulnerability exists in the typo3/fluid package due to improper validation
of user-supplied input before returning it to users. An unauthenticated, remote attacker can exploit
this, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a
user's browser session.
- A session hijacking vulnerability exists in Typo3's password change functionality due to a failure
to properly clean up sessions. An authenticated, remote attacker can exploit this to perform actions
in the user or administrator interface with the privileges of another user.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version");
# https://typo3.org/security/advisory/typo3-core-sa-2019-013
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?23418e06");
# https://typo3.org/security/advisory/typo3-core-sa-2019-012
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d3d320d3");
# https://typo3.org/security/advisory/typo3-core-sa-2019-011
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f72ca664");
script_set_attribute(attribute:"solution", value:
"Upgrade to TYPO3 8.7.25, 9.5.6 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-11832");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/07");
script_set_attribute(attribute:"patch_publication_date", value:"2019/05/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/07/21");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:typo3:typo3");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("typo3_detect.nasl");
script_require_keys("installed_sw/TYPO3", "www/PHP");
script_exclude_keys("Settings/disable_cgi_scanning");
script_require_ports("Services/www", 80);
exit(0);
}
include('http.inc');
include('vcf.inc');
port = get_http_port(default:80, php:TRUE);
app_info = vcf::get_app_info(app:'TYPO3', port:port, webapp:TRUE);
constraints = [
{'min_version':'8.0' , 'fixed_version':'8.7.25'},
{'min_version':'9.0', 'fixed_version':'9.5.6'}
];
vcf::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_HOLE,
flags:{'xss':TRUE}
);
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.1 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.4%