Search for packages
purl | pkg:composer/typo3/cms@6.2.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-18bd-kv2y-jkfw
Aliases: GHSA-3jxq-5xhh-9jr3 |
Cross-Site Scripting (XSS) in TYPO3 component Backend Failing to properly encode incoming data, the bookmark toolbar is susceptible to Cross-Site Scripting. |
Affected by 0 other vulnerabilities. |
VCID-1k8p-1qw8-vybj
Aliases: GHSA-45xg-4w5x-j429 |
TYPO3 Arbitrary Shell Execution in Swiftmailer library The swiftmailer library in use allows to execute arbitrary shell commands if the "From" header comes from a non-trusted source and no "Return-Path" is configured. Affected are only TYPO3 installation the configuration option ``` $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport'] ``` is set to "sendmail". Installations with the default configuration are not affected. |
Affected by 0 other vulnerabilities. |
VCID-1tmr-rtyv-xbat
Aliases: 2014-12-09-2 |
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Possible cache poisining on the homepage when anchors are used. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-1u6q-5rdj-abdb
Aliases: GHSA-qffc-gwpp-m2xr |
XML External Entity (XXE) Processing in TYPO3 Core All XML processing within the TYPO3 CMS are vulnerable to XEE processing. This can lead to load internal and/or external (file) content within an XML structure. Furthermore it is possible to inject arbitrary files for an XML Denial of Service attack. For more information on that topic see https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-2k75-zp2r-67da
Aliases: TYPO3-CORE-SA-2015-012 |
Cross-Site Scripting vulnerability in typolinks All link fields within the TYPO3 installation are vulnerable to Cross-Site Scripting as authorized editors can insert javascript commands by using the url scheme "javascript:". |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-2m7w-zfua-u7b9
Aliases: GHSA-g4pf-3jvq-2gcw |
TYPO3 Remote Code Execution in third party library swiftmailer TYPO3 uses the package swiftmailer/swiftmailer for mail actions. This package is known to be vulnerable to Remote Code Execution. |
Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
VCID-2ypz-t2ty-c3e3
Aliases: CVE-2020-8091 GHSA-qvhv-pwww-53jj |
Typo3 Cross-Site Scripting in Flash component (ELTS) TYPO3 6.2.0 to 6.2.38 ELTS and 7.0.0 to 7.1.0 included a vulnerable external component, which could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on a targeted system. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-33h5-eea4-rben
Aliases: 2015-12-15-2 |
Cross-site Scripting Cross-Site Scripting vulnerability in typolinks. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-3yjx-zkmc-zkau
Aliases: 2016-04-12-4 |
Improper Privilege Management Privilege Escalation in TYPO3 CMS. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-4c69-3sss-jfeb
Aliases: GHSA-vgm8-r9gm-fw59 |
TYPO3 Cross-Site Scripting in legacy form component Failing to sanitize content from editors, the legacy form component is susceptible to Cross-Site Scripting. A valid editor account with access to a form content element is required to exploit this vulnerability. |
Affected by 0 other vulnerabilities. |
VCID-5ejq-8b3z-sbfj
Aliases: 2014-05-22-1 |
Cross-site Scripting The ExtJS JavaScript framework that is shipped with TYPO3 is susceptible to XSS. |
Affected by 0 other vulnerabilities. |
VCID-5m4k-jd3r-abaf
Aliases: GHSA-gj48-w74w-8gvm GMS-2024-342 |
Path Traversal in TYPO3 Core Due to a too loose type check in an API method, attackers could bypass the directory traversal check by providing an invalid UTF-8 encoding sequence. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-67n6-jmg3-qycv
Aliases: 2015-12-15-5 |
Cross-site Scripting Cross-Site Scripting in TYPO3 component Indexed Search. |
Affected by 0 other vulnerabilities. |
VCID-6bne-vnc6-wfe9
Aliases: 2016-07-19-5 |
Cross-site Scripting Cross-Site Scripting vulnerability in typolinks. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-6dym-fpsk-33cw
Aliases: 2014-10-22-2 |
Code Injection Arbitrary Shell Execution in Swiftmailer library. |
Affected by 0 other vulnerabilities. |
VCID-77zk-mttw-7yb5
Aliases: CVE-2014-3943 GHSA-qqh2-h6gw-6x8x |
Typo3 XSS Vulnerabilities Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allow remote authenticated editors to inject arbitrary web script or HTML via unknown parameters. |
Affected by 0 other vulnerabilities. |
VCID-7hxf-mt3r-6bag
Aliases: 2015-07-01-6 |
Cross-site Scripting Cross-Site Scripting in 3rd party library Flowplayer. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-7rqj-m3xh-5uam
Aliases: 2015-09-08-1 |
Information Exposure Frontend: Unauthenticated Path Disclosure. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-8a25-9af4-tyhk
Aliases: GHSA-xvcp-33rc-j8gq |
Insecure Unserialize in TYPO3 Import/Export Failing to properly validate incoming import data, the Import/Export component is susceptible to insecure unserialize. To exploit this vulnerability a valid backend user account is needed. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-8jv7-9a74-q3ee
Aliases: 2016-04-12-1 |
Cross-site Scripting Cross-Site Scripting in TYPO3 Backend. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-8wyj-vv9y-jbhp
Aliases: GHSA-8j9v-4hhh-x43c |
Cross-Site Scripting (XSS) in TYPO3 component CSS styled content Failing to properly encode user input, the CSS styled content component is susceptible to Cross-Site Scripting, allowing authenticated editors to inject arbitrary HTML or JavaScript. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-9mn3-51g6-zybx
Aliases: GHSA-mxjf-hc9v-xgv2 |
ExtJS JavaScript framework used in TYPO3 vulnerable to Cross-site Scripting Failing to properly validate the HTTP host-header TYPO3 CMS is susceptible to host spoofing. TYPO3 uses the HTTP host-header to generate absolute URLs in several places like 404 handling, http(s) enforcement, password reset links and many more. Since the host header itself is provided by the client it can be forged to any value, even in a name based virtual hosts environment. A blog post describes this problem in great detail. |
Affected by 0 other vulnerabilities. |
VCID-a7q1-gy13-nyb5
Aliases: GHSA-qrxh-46mr-pr7q |
TYPO3 is susceptible to Cross-Site Flashing The flashplayer misses to validate flash and image files. Therefore it is possible to embed flash videos from external domains. |
Affected by 0 other vulnerabilities. |
VCID-a8wf-nz2q-s3gh
Aliases: GHSA-gwfx-p7mr-f92v |
Missing Access Check in TYPO3 CMS Extbase request handling fails to implement a proper access check for requested controller/ action combinations, which makes it possible for an attacker to execute arbitrary Extbase actions by crafting a special request. To successfully exploit this vulnerability, an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation. The missing access check inevitably leads to information disclosure or remote code execution, depending on the action that an attacker is able to execute. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-aepn-e5gq-kygg
Aliases: TYPO3-CORE-SA-2015-014 |
Cross-Site Flashing The flashplayer misses to validate flash and image files. Therefore it is possible to embed flash videos from external domains. |
Affected by 0 other vulnerabilities. |
VCID-af14-5ttt-t7ac
Aliases: TYPO3-CORE-SA-2015-011 |
Multiple Cross-Site Scripting vulnerabilities in backend Failing to properly encode user input, several backend components are susceptible to Cross-Site Scripting, allowing authenticated editors to inject arbitrary HTML or JavaScript. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-aujs-m8j8-guh1
Aliases: 2016-05-24-1 |
Improper Access Control Missing Access Check in TYPO3 CMS. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-axg7-qg5u-kbg7
Aliases: GHSA-86r8-4g3w-7xjp |
Cross-Site Scripting in TYPO3 Backend Failing to properly encode user input, some backend components are vulnerable to Cross-Site Scripting. A valid backend user account is needed to exploit this vulnerability. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-b8j6-xu3r-budh
Aliases: 2016-02-16-3 |
Cross-site Scripting Cross-Site Scripting in legacy form component. |
Affected by 0 other vulnerabilities. |
VCID-bd6u-nca5-gyeu
Aliases: GHSA-hq37-rfjc-mr8h |
Cross-Site Scripting (XSS) in TYPO3 Backend Failing to properly encode user input, the page module is vulnerable to Cross-Site Scripting. A valid backend user account with permissions to edit plugins is needed to exploit this vulnerability. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-bfg8-yh9h-5kce
Aliases: 2016-02-23-4 |
Uncontrolled Resource Consumption Denial of Service attack possibility in TYPO3 component Indexed Search. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-c7jx-ey45-judf
Aliases: CVE-2014-3941 GHSA-594h-cx6w-p4jf |
Typo3 Host Header Spoofing Vulnerability TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing." |
Affected by 0 other vulnerabilities. |
VCID-c9g4-gcfy-8ug4
Aliases: 2015-12-15-3 |
Cross-site Scripting Multiple Cross-Site Scripting vulnerabilities in frontend. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-cdkv-3rbf-27ed
Aliases: 2016-07-19-4 |
Information Disclosure in TYPO3 Backend. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-cnqq-fdxb-9uat
Aliases: GHSA-c7rj-92xr-wprg |
Insecure Unserialize in TYPO3 Backend Failing to properly validate incoming data, the suggest wizard is susceptible to insecure unserialize. To exploit this vulnerability a valid backend user account is needed. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-crve-atm4-zyaf
Aliases: 2014-12-09-1 |
URL Redirection to Untrusted Site ('Open Redirect') Possible link spoofing on the homepage when anchors are used. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-ctuh-5vv7-wqcd
Aliases: CVE-2014-3944 GHSA-9j8h-xrgj-7gw2 |
TYPO3 Improper Session Invalidation The Authentication component in TYPO3 6.2.0 before 6.2.3 does not properly invalidate timed out user sessions, which allows remote attackers to bypass authentication via unspecified vectors. |
Affected by 0 other vulnerabilities. |
VCID-cwsm-v895-nqc7
Aliases: CVE-2015-5956 GHSA-989h-wv8x-933p |
TYPO3 cross-site scripting (XSS) The sanitizeLocalUrl function in TYPO3 6.x before 6.2.15, 7.x before 7.4.0, 4.5.40, and earlier allows remote authenticated users to bypass the XSS filter and conduct cross-site scripting (XSS) attacks via a base64 encoded data URI, as demonstrated by the (1) returnUrl parameter to show_rechis.php and the (2) redirect_url parameter to index.php. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-d2qd-qjn9-jffs
Aliases: 2016-07-19-1 |
Cross-site Scripting Cross-Site Scripting in TYPO3 Backend. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-d381-rcq3-n3az
Aliases: GHSA-vpr3-rc99-2wpr |
Information Disclosure in TYPO3 Backend The TYPO3 backend module stores the username of an authenticated backend user in its cache files. By guessing the file path to the cache files it is possible to receive valid backend usernames. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-d42j-347n-e7en
Aliases: CVE-2021-21338 GHSA-4jhw-2p6j-5wmp |
Open Redirection in Login Handling ### Problem It has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability. ### Solution Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to Alexander Kellner who reported this issue and to TYPO3 security team member Torben Hansen who fixed the issue. ### References * [TYPO3-CORE-SA-2021-001](https://typo3.org/security/advisory/typo3-core-sa-2021-001) |
Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 3 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-dkr9-d6n6-puf5
Aliases: TYPO3-CORE-SA-2015-013 |
Multiple Cross-Site Scripting vulnerabilities in frontend Failing to properly encode editor input, several frontend components are susceptible to Cross-Site Scripting, allowing authenticated editors to inject arbitrary HTML. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-dm6k-fzm6-sqbe
Aliases: GHSA-p5c5-gmj4-g48f |
Cross-Site Scripting (XSS) vulnerability in typolinks All link fields within the TYPO3 installation are vulnerable to Cross-Site Scripting as authorized editors can insert data commands by using the url scheme "data:". |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-dm7r-2u9q-17hh
Aliases: GHSA-p84g-j2gh-83g3 |
TYPO3 possible cache poisoning on the homepage when anchors are used A request URL with arbitrary arguments, but still pointing to the home page of a TYPO3 installation can be cached if the configuration option config.prefixLocalAnchors is used with the values "all" or "cached". The impact of this vulnerability is that unfamiliar looking links to the home page can end up in the cache, which leads to a reload of the page in the browser when section links are followed by web page visitors, instead of just directly jumping to the requested section of the page. TYPO3 versions 4.6.x and higher are only affected if the homepage is not a shortcut to a different page. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-dwrf-me8a-z7fa
Aliases: 2015-07-01-1 |
Improper Access Control Access bypass when editing file metadata. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-ej97-kcp8-hffu
Aliases: 2016-02-23-2 |
Cross-site Scripting Cross-Site Scripting in TYPO3 component Backend. |
Affected by 0 other vulnerabilities. |
VCID-fehf-p36x-wfha
Aliases: 2016-04-12-2 |
Information Exposure Arbitrary File Disclosure in Form Component. |
Affected by 0 other vulnerabilities. |
VCID-gb7f-4sm6-tkaw
Aliases: 2016-09-14-2 |
Uncontrolled Resource Consumption Cache Flooding in TYPO3 Frontend. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 3 other vulnerabilities. |
VCID-hbzu-v4jk-hyhd
Aliases: 2016-02-23-1 |
Improper Restriction of XML External Entity Reference XML External Entity (XXE) Processing in TYPO3 Core. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-heyp-4b45-v7gp
Aliases: 2016-11-22-1 |
Insecure Deserialization Insecure Unserialize in TYPO3 Backend. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-htsn-wq8h-qbgp
Aliases: 2017-01-03-1 |
Code Injection Remote Code Execution in third party library swiftmailer. |
Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 5 other vulnerabilities. |
VCID-j1nq-26xv-yff3
Aliases: GHSA-j86x-pjmr-9m6w |
SQL Injection in TYPO3 Frontend Login Failing to properly escape user input, the frontend login component is vulnerable to SQL Injection. A valid frontend user account is needed to exploit this vulnerability. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-jyxd-d6ce-7qd9
Aliases: GHSA-r287-hc8j-w56h |
TYPO3 Information Disclosure Vulnerability Exploitable by Editors It has been discovered, that editors with access to the file list module could list all files names and folder names in the root directory of a TYPO3 installation. Modification of files, listing further nested directories or retrieving file contents was not possible. A valid backend user account is needed to exploit this vulnerability. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-k7zv-e4ez-dbaz
Aliases: GHSA-5cxf-xx9j-54jc |
Multiple Cross-Site Scripting vulnerabilities in TYPO3 backend Failing to properly encode user input, several backend components are susceptible to Cross-Site Scripting, allowing authenticated editors to inject arbitrary HTML or JavaScript. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-k8yx-gezq-7fd6
Aliases: GHSA-6xh8-8pfv-53vx |
Authentication Bypass in TYPO3 CMS The default authentication service misses to invalidate empty strings as password. Therefore it is possible to authenticate backend and frontend users without password set in the database. Note: TYPO3 does not allow to create user accounts without a password. Your TYPO3 installation might only be affected if there is a third party component creating user accounts without password by directly manipulating the database. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-kjj6-m1r1-uufb
Aliases: 2015-12-15-4 |
Cross-site Scripting TYPO3 is susceptible to Cross-Site Flashing. |
Affected by 0 other vulnerabilities. |
VCID-kktc-18fc-cuar
Aliases: GHSA-pqfv-97hj-g97g |
TYPO3 Frontend vulnerable to Unauthenticated Path Disclosure It has been discovered, that calling a PHP script which is delivered with TYPO3 for testing purposes, discloses the absolute server path to the TYPO3 installation. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-krcw-y6kx-37br
Aliases: 2016-02-23-3 |
Cross-site Scripting Cross-Site Scripting in TYPO3 component CSS styled content. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-ksgk-se77-67at
Aliases: GHSA-5j86-5xvg-7q93 |
TYPO3 Cross-Site Scripting (XSS) in form component Failing to sanitize content from unauthenticated website visitors, the form component is susceptible to Cross-Site Scripting. |
Affected by 0 other vulnerabilities. |
VCID-m3gb-henf-4uga
Aliases: 2016-07-19-3 |
SQL Injection in TYPO3 Frontend Login. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-m57g-8gch-7ydt
Aliases: GHSA-9895-53fc-98v2 |
TYPO3 SQL Injection in dbal A flaw in the database escaping API results in a SQL injection vulnerability when extension dbal is enabled and configured for MySQL passthrough mode in its extension configuration. All queries which use the DatabaseConnection::sql_query are vulnerable, even if arguments were properly escaped with DatabaseConnection::quoteStr beforehand. |
Affected by 0 other vulnerabilities. |
VCID-maa6-4fkn-pqhz
Aliases: GHSA-jqr8-q455-xx45 |
TYPO3 Brute Force Protection Bypass in backend login The backend login has a basic brute force protection implementation which pauses for 5 seconds if wrong credentials are given. This pause however could be bypassed by forging a special request, making brute force attacks on backend editor credentials more feasible. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-mc77-ed2h-13dy
Aliases: GHSA-cg4m-qjjp-7497 |
TYPO3 Cross-Site Scripting in link validator component Failing to sanitize content from editors, the link validator component is susceptible to Cross-Site Scripting. A valid editor account with access to content which is scanned by the link validator component is required to exploit this vulnerability. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-mnqn-qqgp-jbhf
Aliases: CVE-2013-4701 GHSA-5qp6-78pr-gv8c |
PHP OpenID Library Denial of Service vulnerability Auth/Yadis/XML.php in PHP OpenID Library 2.2.2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via XRDS data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. |
Affected by 0 other vulnerabilities. |
VCID-n14c-7g17-qudk
Aliases: GHSA-r9vc-jfmh-6j48 |
TYPO3 frontend login vulnerable to Session Fixation It has been discovered that TYPO3 is susceptible to session fixation. If a user authenticates while anonymous session data is present, the session id is not changed. This makes it possible for attackers to generate a valid session id, trick users into using this session id (e.g. by leveraging a different Cross-Site Scripting vulnerability) and then maybe getting access to an authenticated session. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-nnxd-zjsh-wqbp
Aliases: GHSA-wp8j-c736-c5r3 |
TYPO3 Cross-Site Scripting Vulnerability Exploitable by Editors It has been discovered that link tags generated by typolink functionality in the website's frontend are vulnerable to cross-site scripting - values being assigned to HTML attributes have not been parsed correctly. A valid backend user account is needed to exploit this vulnerability. As second and separate vulnerability in the filelist module of the backend user interface has been referenced with this advisory as well. Error messages being shown after using a malicious name for renaming a file are not propery encoded, thus vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-psu6-y6fc-nqh4
Aliases: 2016-07-19-2 |
Deserialization of Untrusted Data Insecure Unserialize in TYPO3 Import/Export. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-pyn2-c81e-2bbg
Aliases: 2016-02-16-1 |
SQL Injection in dbal. |
Affected by 0 other vulnerabilities. |
VCID-rf5y-9xhy-ckhk
Aliases: 2015-07-01-5 |
Improper Restriction of Excessive Authentication Attempts Brute Force Protection Bypass in backend login. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-rnen-s5y6-8yg1
Aliases: CVE-2015-8759 GHSA-j5v7-9xr5-m7gx |
TYPO3 Cross-site Scripting vulnerability Cross-site scripting (XSS) vulnerability in the typoLink function in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allows remote authenticated editors to inject arbitrary web script or HTML via a link field. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-rtd6-q7tg-ykfh
Aliases: CVE-2020-26227 GHSA-vqqx-jw6p-q3rf |
Cross-Site Scripting in Fluid view helpers > ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7) > * CWE-79 ### Problem It has been discovered that system extension Fluid (`typo3/cms-fluid`) of the TYPO3 core is vulnerable to cross-site scripting passing user-controlled data as argument to Fluid view helpers. ``` <f:form ... fieldNamePrefix="{payload}" /> <f:be.labels.csh ... label="{payload}" /> <f:be.menus.actionMenu ... label="{payload}" /> ``` ### Solution Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported this issue and to TYPO3 security team members Helmut Hummel & Oliver Hader who fixed the issue. ### References * [TYPO3-CORE-SA-2020-010](https://typo3.org/security/advisory/typo3-core-sa-2020-010) |
Affected by 53 other vulnerabilities. Affected by 113 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-t352-87cy-4qhm
Aliases: GHSA-pw2q-qwvj-gh43 |
Cache Flooding in TYPO3 Frontend Links with a valid cHash argument lead to newly generated page cache entries. Because the cHash is not bound to a specific page, attackers could use valid cHash arguments for multiple pages, leading to additional useless page cache entries. Depending on the number of pages in the system and the number of available valid links with a cHash, attackers could add a considerable amount of additional cache entries, which in the end exceed storage limits and thus could lead to the system not responding any more. This means the Cache Flooding attack potentially could lead to a successful Denial of Service (DoS) attack. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-t7fe-ph2m-j3e5
Aliases: 2016-09-14-1 |
Cross-site Scripting XSS in TYPO3 Backend. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 3 other vulnerabilities. |
VCID-u4n4-rh2y-8ycg
Aliases: GHSA-6fc6-cj2j-h22x |
TYPO3 Multiple Cross-Site Scripting vulnerabilities in frontend Failing to properly encode editor input, several frontend components are susceptible to Cross-Site Scripting, allowing authenticated editors to inject arbitrary HTML. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-ue38-abs9-ffa8
Aliases: 2016-02-16-2 |
Cross-site Scripting Cross-Site Scripting in link validator component. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-urhg-ftwf-pubr
Aliases: 2015-07-01-2 |
Frontend login Session Fixation. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-v83x-2hx7-yycg
Aliases: CVE-2021-21339 GHSA-qx3w-4864-94ch |
Cleartext storage of session identifier ### Problem User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. ### Solution Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader who fixed the issue. ### References * [TYPO3-CORE-SA-2021-006](https://typo3.org/security/advisory/typo3-core-sa-2021-006) |
Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 3 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-vasc-x3hz-nqha
Aliases: GHSA-wh8q-72cp-p5wf |
Cross-Site Scripting in TYPO3 component Indexed Search Failing to properly encode editor input, the search result view of indexed_search is susceptible to Cross-Site Scripting, allowing authenticated editors to inject arbitrary HTML. |
Affected by 0 other vulnerabilities. |
VCID-vujd-b56y-8kfk
Aliases: GHSA-v5jp-4h2p-j2p4 |
Privilege Escalation in TYPO3 CMS The workspace/ version preview link created by a privileged (backend) user could be abused to obtain certain editing permission, if the admin panel is configured to be shown. A valid preview link is required to exploit this vulnerability. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-w5s9-wjpe-bkc1
Aliases: CVE-2013-7341 GHSA-j6c3-3c4w-qv8p |
Moodle cross-site scripting (XSS) vulnerabilities Multiple cross-site scripting (XSS) vulnerabilities in Flowplayer Flash before 3.2.17, as used in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2, allow remote attackers to inject arbitrary web script or HTML by (1) providing a crafted playerId or (2) referencing an external domain, a related issue to CVE-2013-7342. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-wvzh-uxhw-g3d5
Aliases: 2015-07-01-3 |
Cross-site Scripting Cross-Site Scripting exploitable by Editors. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-x5wu-b995-xkcm
Aliases: 2016-04-12-3 |
Improper Authentication Authentication Bypass in TYPO3 CMS. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-xh3z-5w6z-ducr
Aliases: GHSA-pmxp-7224-h794 |
Denial of Service (DoS) attack possibility in TYPO3 component Indexed Search Due to an oversized maximum result limit, TYPO3 component Indexed Search is susceptible to a Denial of Service attack. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-xztw-e2f8-3qf3
Aliases: 2016-02-16-4 |
Cross-site Scripting Cross-Site Scripting in form component. |
Affected by 0 other vulnerabilities. |
VCID-y15u-f9e9-akff
Aliases: 2016-11-22-2 |
Path Traversal in TYPO3 Core. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-y8va-79qc-97cc
Aliases: GHSA-75mx-chcf-2q32 |
TYPO3 Cross-Site Scripting vulnerability in typolinks All link fields within the TYPO3 installation are vulnerable to Cross-Site Scripting as authorized editors can insert javascript commands by using the url scheme `javascript:`. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-y93e-ckjh-wqea
Aliases: 2015-07-01-4 |
Information Disclosure possibility exploitable by Editors. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-ype3-tase-wue6
Aliases: GMS-2015-25 |
Unauthenticated Path Disclosure It has been discovered, that calling a PHP script which is delivered with TYPO3 for testing purposes, discloses the absolute server path to the TYPO3 installation. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-yq8z-3ahh-1kbj
Aliases: GHSA-4r76-xr68-w7m7 |
TYPO3 may allow editors to change, create, or delete metadata of files not within their file mounts It has been discovered, that editors with access to file meta data table could change, create or delete metadata of files which are not within their file mounts. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-yusq-8b86-yqc8
Aliases: 2014-10-22-1 |
Uncontrolled Resource Consumption Denial of Service in OpenID System Extension. |
Affected by 0 other vulnerabilities. |
VCID-z5h8-5shq-kbgh
Aliases: GHSA-wrpf-2x8h-82gr |
Typo3 Arbitrary File Disclosure in Form Component Failing to properly validate user input, the form component is susceptible to Arbitrary File Disclosure. A valid backend user account is needed to exploit this vulnerability. Only forms are vulnerable, which contain upload fields. |
Affected by 0 other vulnerabilities. |
VCID-zrsh-tk2s-2uhm
Aliases: 2015-12-15-1 |
Cross-site Scripting Multiple Cross-Site Scripting vulnerabilities in TYPO3 backend. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-zu53-dnd1-h3gu
Aliases: GHSA-5wx6-xwxf-q8qj |
Cross-Site Scripting in TYPO3 Backend Failing to properly encode user input, some backend components are vulnerable to Cross-Site Scripting. A valid backend user account is needed to exploit this vulnerability. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-18tp-5nfu-nbew | TYPO3 vulnerable to authentication bypass via leveraging knowledge of password hash The Authentication component in TYPO3 before 6.2, when salting for password hashing is disabled, does not require knowledge of the cleartext password if the password hash is known, which allows remote attackers to bypass authentication and gain access to the backend by leveraging knowledge of a password hash. |
CVE-2014-3945
GHSA-h7wf-jg4f-x2wc |