Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-41113
HistoryOct 05, 2021 - 12:00 a.m.

CVE-2021-41113

2021-10-0500:00:00
ubuntu.com
ubuntu.com
11

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

60.2%

TYPO3 is an open source PHP based web content management system released
under the GNU GPL. It has been discovered that the new TYPO3 v11 feature
that allows users to create and share deep links in the backend user
interface is vulnerable to cross-site-request-forgery. The impact is the
same as described in TYPO3-CORE-SA-2020-006 (CVE-2020-11069). However, it
is not limited to the same site context and does not require the attacker
to be authenticated. In a worst case scenario, the attacker could create a
new admin user account to compromise the system. To successfully carry out
an attack, an attacker must trick his victim to access a compromised
system. The victim must have an active session in the TYPO3 backend at that
time. The following Same-Site cookie settings in
$GLOBALS[TYPO3_CONF_VARS][BE][cookieSameSite] are required for an attack to
be successful: SameSite=strict: malicious evil.example.org invoking TYPO3
application at good.example.org and SameSite=lax or none: malicious
evil.com invoking TYPO3 application at example.org. Update your instance to
TYPO3 version 11.5.0 which addresses the problem described.

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

60.2%