Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-24814

Опубликовано: 07 фев. 2023
Источник: nvd
CVSS3: 8.8
CVSS3: 6.1
EPSS Низкий

Описание

TYPO3 is a free and open source Content Management Framework released under the GNU General Public License. In affected versions the TYPO3 core component GeneralUtility::getIndpEnv() uses the unfiltered server environment variable PATH_INFO, which allows attackers to inject malicious content. In combination with the TypoScript setting config.absRefPrefix=auto, attackers can inject malicious HTML code to pages that have not been rendered and cached, yet. As a result, injected values would be cached and delivered to other website visitors (persisted cross-site scripting). Individual code which relies on the resolved value of GeneralUtility::getIndpEnv('SCRIPT_NAME') and corresponding usages (as shown below) are vulnerable as well. Additional investigations confirmed that at least Apache web server deployments using CGI (FPM, FCGI/FastCGI, and similar) are affected. However, there still might be the risk that other scenarios like nginx, IIS, or Apache/mod_php are vulnerable. The u

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
Версия от 8.7.0 (включая) до 9.7.51 (исключая)
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
Версия от 9.0.0 (включая) до 9.5.40 (исключая)
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
Версия от 10.0.0 (включая) до 10.4.36 (исключая)
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
Версия от 11.0.0 (включая) до 11.5.23 (исключая)
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
Версия от 12.0.0 (включая) до 12.2.0 (исключая)

EPSS

Процентиль: 52%
0.00296
Низкий

8.8 High

CVSS3

6.1 Medium

CVSS3

Дефекты

CWE-79
CWE-79

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 3 лет назад

TYPO3 is a free and open source Content Management Framework released under the GNU General Public License. In affected versions the TYPO3 core component `GeneralUtility::getIndpEnv()` uses the unfiltered server environment variable `PATH_INFO`, which allows attackers to inject malicious content. In combination with the TypoScript setting `config.absRefPrefix=auto`, attackers can inject malicious HTML code to pages that have not been rendered and cached, yet. As a result, injected values would be cached and delivered to other website visitors (persisted cross-site scripting). Individual code which relies on the resolved value of `GeneralUtility::getIndpEnv('SCRIPT_NAME')` and corresponding usages (as shown below) are vulnerable as well. Additional investigations confirmed that at least Apache web server deployments using CGI (FPM, FCGI/FastCGI, and similar) are affected. However, there still might be the risk that other scenarios like nginx, IIS, or Apache/mod_php are vulnerable. Th...

CVSS3: 8.8
github
почти 3 года назад

TYPO3 is vulnerable to Cross-Site Scripting via frontend rendering

CVSS3: 8.8
fstec
около 3 лет назад

Уязвимость функции GeneralUtility::getIndpEnv() системы управления контентом TYPO3, позволяющая нарушителю осуществлять межсайтовые сценарные атаки

EPSS

Процентиль: 52%
0.00296
Низкий

8.8 High

CVSS3

6.1 Medium

CVSS3

Дефекты

CWE-79
CWE-79