Lucene search

K
githubGitHub Advisory DatabaseGHSA-8W3P-QH3X-6GJR
HistoryDec 13, 2022 - 5:13 p.m.

TYPO3 CMS vulnerable to Sensitive Information Disclosure via YAML Placeholder Expressions in Site Configuration

2022-12-1317:13:37
CWE-200
CWE-917
GitHub Advisory Database
github.com
12
typo3
vulnerability
sensitive info disclosure
yaml
site configuration
exploit
update
elts
backend module
administrator privileges
security advisory.

5.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L

0.001 Low

EPSS

Percentile

36.8%

Problem

Due to the lack of handling user-submitted YAML placeholder expressions in the site configuration backend module, attackers could expose sensitive internal information, such as system configuration or HTTP request messages of other website visitors.

A valid backend user account having administrator privileges is needed to exploit this vulnerability.

Solution

Update to TYPO3 versions 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.

References

Affected configurations

Vulners
Node
typo3cms_poll_system_extensionRange<12.1.1
OR
typo3cms_poll_system_extensionRange<11.5.20
OR
typo3cms_poll_system_extensionRange<10.4.33
OR
typo3cms_poll_system_extensionRange<12.1.1
OR
typo3cms_poll_system_extensionRange<11.5.20
OR
typo3cms_poll_system_extensionRange<10.4.33
OR
typo3cms_poll_system_extensionRange<9.5.38

5.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L

0.001 Low

EPSS

Percentile

36.8%