CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
47.8%
> ### Meta
> * CVSS: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C
(5.7)
Due to a parsing issue in upstream package masterminds/html5
, malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This allows to by-pass the cross-site scripting mechanism of typo3/html-sanitizer
.
Update to typo3/html-sanitizer
versions 1.0.7 or 2.0.16 that fix the problem described.
Thanks to David Klein who reported this issue, and to TYPO3 security team member Oliver Hader who fixed the issue.
github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-36020.yaml
github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-36020.yaml
github.com/FriendsOfPHP/security-advisories/blob/master/typo3/html-sanitizer/CVE-2022-36020.yaml
github.com/TYPO3/html-sanitizer
github.com/TYPO3/html-sanitizer/commit/60bfdc7f9b394d0236e16ee4cea8372a7defa493
github.com/TYPO3/html-sanitizer/security/advisories/GHSA-47m6-46mj-p235
nvd.nist.gov/vuln/detail/CVE-2022-36020
packagist.org/packages/masterminds/html5
packagist.org/packages/typo3/html-sanitizer
typo3.org/security/advisory/typo3-core-sa-2022-011