Описание
Open Redirection in Login Handling
Problem
It has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability.
Solution
Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
Credits
Thanks to Alexander Kellner who reported this issue and to TYPO3 security team member Torben Hansen who fixed the issue.
References
Ссылки
- https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4jhw-2p6j-5wmp
- https://nvd.nist.gov/vuln/detail/CVE-2021-21338
- https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2021-21338.yaml
- https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2021-21338.yaml
- https://packagist.org/packages/typo3/cms-core
- https://typo3.org/security/advisory/typo3-core-sa-2021-001
Пакеты
typo3/cms-core
>= 6.2.0, <= 6.2.56
6.2.57
typo3/cms-core
>= 7.0.0, <= 7.6.50
7.6.51
typo3/cms-core
>= 8.0.0, <= 8.7.39
8.7.40
typo3/cms-core
>= 10.0.0, < 10.4.14
10.4.14
typo3/cms-core
>= 11.0.0, < 11.1.1
11.1.1
typo3/cms-core
>= 9.0.0, < 9.5.25
9.5.25
typo3/cms
>= 10.0.0, < 10.4.14
10.4.14
typo3/cms
>= 11.0.0, < 11.1.1
11.1.1
typo3/cms
>= 9.0.0, < 9.5.25
9.5.25
Связанные уязвимости
TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 it has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability. This is fixed in versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1.