6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
60.2%
TYPO3 is an open source PHP based web content management system released
under the GNU GPL. It has been discovered that the new TYPO3 v11 feature
that allows users to create and share deep links in the backend user
interface is vulnerable to cross-site-request-forgery. The impact is the
same as described in TYPO3-CORE-SA-2020-006 (CVE-2020-11069). However, it
is not limited to the same site context and does not require the attacker
to be authenticated. In a worst case scenario, the attacker could create a
new admin user account to compromise the system. To successfully carry out
an attack, an attacker must trick his victim to access a compromised
system. The victim must have an active session in the TYPO3 backend at that
time. The following Same-Site cookie settings in
$GLOBALS[TYPO3_CONF_VARS][BE][cookieSameSite] are required for an attack to
be successful: SameSite=strict: malicious evil.example.org invoking TYPO3
application at good.example.org and SameSite=lax or none: malicious
evil.com invoking TYPO3 application at example.org. Update your instance to
TYPO3 version 11.5.0 which addresses the problem described.
github.com/TYPO3/typo3/commit/fa51999203c5e5d913ecae5ea843ccb2b95fa33f
github.com/TYPO3/typo3/security/advisories/GHSA-657m-v5vm-f6rw
launchpad.net/bugs/cve/CVE-2021-41113
nvd.nist.gov/vuln/detail/CVE-2021-41113
security-tracker.debian.org/tracker/CVE-2021-41113
typo3.org/security/advisory/typo3-core-sa-2020-006
www.cve.org/CVERecord?id=CVE-2021-41113
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
60.2%