Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-32768
HistoryAug 10, 2021 - 12:00 a.m.

CVE-2021-32768

2021-08-1000:00:00
ubuntu.com
ubuntu.com
17

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

36.3%

TYPO3 is an open source PHP based web content management system released
under the GNU GPL. In affected versions failing to properly parse, sanitize
and encode malicious rich-text content, the content rendering process in
the website frontend is vulnerable to cross-site scripting. Corresponding
rendering instructions via TypoScript functionality HTMLparser does not
consider all potentially malicious HTML tag & attribute combinations per
default. In default scenarios, a valid backend user account is needed to
exploit this vulnerability. In case custom plugins used in the website
frontend accept and reflect rich-text content submitted by users, no
authentication is required. Update to TYPO3 versions 7.6.53 ELTS, 8.7.42
ELTS, 9.5.29, 10.4.19, 11.3.2 that fix the problem described.

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

36.3%