Описание
TYPO3 Potential Open Redirect via Parsing Differences
Problem
Applications that use TYPO3\CMS\Core\Http\Uri
to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks.
Solution
Update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.
Credits
Thanks to Sam Mush and Christian Eßl who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.
References
Пакеты
typo3/cms-core
>= 9.0.0, <= 9.5.48
9.5.49
typo3/cms-core
>= 10.0.0, <= 10.4.47
10.4.48
typo3/cms-core
>= 11.0.0, <= 11.5.41
11.5.42
typo3/cms-core
>= 12.0.0, <= 12.4.24
12.4.25
typo3/cms-core
>= 13.0.0, <= 13.4.2
13.4.3
Связанные уязвимости
TYPO3 is a free and open source Content Management Framework. Applications that use `TYPO3\CMS\Core\Http\Uri` to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks. Users are advised to update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 LTS, 12.4.25 LTS, 13.4.3 which fix the problem described. There are no known workarounds for this vulnerability.