Skip to content

Commit

Permalink
security/vuxml: Record typo3-1{12} vulnerabilities
Browse files Browse the repository at this point in the history
PR: 275073 275074
  • Loading branch information
fernape committed Nov 15, 2023
1 parent 04ffb9b commit 9f2b97c
Showing 1 changed file with 56 additions and 0 deletions.
56 changes: 56 additions & 0 deletions security/vuxml/vuln/2023.xml
@@ -1,3 +1,59 @@
<vuln vid="7cc003cb-83b9-11ee-957d-b42e991fc52e">
<topic>typo3 -- Multiple vulnerabilities</topic>
<affects>
<package>
<name>typo3-11</name>
<name>typo3-12</name>
<range><lt>11.5.33</lt></range>
<range><lt>12.4.33</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>security-advisories@github.com reports:</p>
<blockquote cite="https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019">
<p>Weak Authentication in Session Handling in typo3/cms-core:
In typo3 installations there are always
at least two different sites. Eg. first.example.org and
second.example.com. In affected versions a session cookie
generated for the first site can be reused on the second site
without requiring additional authentication. This
vulnerability has been addressed in versions 8.7.55, 9.5.44,
10.4.41, 11.5.33, and 12.4.8. Users are advised to upgrade.
There are no known workarounds for this vulnerability.</p>
<p>Information Disclosure in Install Tool in typo3/cms-install:
In affected versions the login screen of the standalone
install tool discloses the full path of the transient data
directory (e.g. /var/www/html/var/transient/). This applies
to composer-based scenarios only - classic non-composer
installations are not affected. This issue has been addressed
in version 12.4.8. Users are advised to upgrade. There are
no known workarounds for this vulnerability.
</p>
<p>By-passing Cross-Site Scripting Protection in HTML Sanitizer:
In affected versions DOM processing instructions are not
handled correctly. This allows bypassing the cross-site
scripting mechanism of typo3/html-sanitizer. This
vulnerability has been addressed in versions 1.5.3 and 2.1.4.
Users are advised to upgrade. There are no known workarounds
for this vulnerability.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2023-47125</cvename>
<url>https://nvd.nist.gov/vuln/detail/CVE-2023-47125</url>
<cvename>CVE-2023-47126</cvename>
<url>https://nvd.nist.gov/vuln/detail/CVE-2023-47126</url>
<cvename>CVE-2023-47127</cvename>
<url>https://nvd.nist.gov/vuln/detail/CVE-2023-47127</url>
</references>
<dates>
<discovery>2023-11-14</discovery>
<entry>2023-11-15</entry>
</dates>
</vuln>

<vuln vid="31f45d06-7f0e-11ee-94b4-6cc21735f730">
<topic>postgresql-server -- Memory disclosure in aggregate function calls</topic>
<affects>
Expand Down

0 comments on commit 9f2b97c

Please sign in to comment.