It has been discovered that link tags generated by typolink functionality in the websiteβs frontend are vulnerable to cross-site scripting - values being assigned to HTML attributes have not been parsed correctly. A valid backend user account is needed to exploit this vulnerability.
As second and separate vulnerability in the filelist module of the backend user interface has been referenced with this advisory as well. Error messages being shown after using a malicious name for renaming a file are not propery encoded, thus vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2015-07-01-3.yaml
github.com/TYPO3/typo3
github.com/TYPO3/typo3/commit/7695d91fca1a96a3a3e7466097ae92c32b1130d8
github.com/TYPO3/typo3/commit/d7feb40c8d277c6b6ab3a548313be1e1a2084299
typo3.org/security/advisory/typo3-core-sa-2015-004
typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-004