Skip to content

HTML-injection through form-fields in HTML-email #1306

@neufeind

Description

@neufeind

We received a vulnerability report and confirmed it to be usable to inject HTML in emails. A regular text-field was used with content

"<img src=x><a href="http://evil.com">clickme</a>”

That got escaped via htmlspecialchars in VariablesViewHelper but after being rendered the properly escaped HTML was again turned into a working HTML-injection by the last line (html_entity_decode).

Can you possibly confirm the issue and explain why there is a html_entity_decode at all in this place?

return html_entity_decode($parseObject->render(), ENT_QUOTES, 'UTF-8');

The environment that this happens in (unfortunately) still is a TYPO3 v11 with powermail 10.9.2 (last compatible with v11). But the code in master seems like nothing changed in this regard.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions