Skip to content

Typo3 Backend XSS Vulnerability

Moderate severity GitHub Reviewed Published May 2, 2022 to the GitHub Advisory Database • Updated Jan 23, 2024

Package

composer typo3/cms (Composer)

Affected versions

>= 3.3.0, < 3.9.0
>= 4.0, < 4.0.12
>= 4.1.0, < 4.1.10
>= 4.2.0, < 4.2.6
= 4.3alpha1

Patched versions

4.0.12
4.1.10
4.2.6

Description

An Information Disclosure vulnerability in jumpUrl mechanism, used to track access on web pages and provided files, allows a remote attacker to read arbitrary files on a host.

The expected value of a mandatory hash secret, intended to invalidate such requests, is exposed to remote users allowing them to bypass access control by providing the correct value.

There's no authentication required to exploit this vulnerability. The vulnerability allows to read any file, the web server user account has access to.

References

Published by the National Vulnerability Database Mar 5, 2009
Published to the GitHub Advisory Database May 2, 2022
Reviewed Jan 23, 2024
Last updated Jan 23, 2024

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(52nd percentile)

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

CVE ID

CVE-2009-0816

GHSA ID

GHSA-jg55-3q6h-2ccf

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.