Search for vulnerabilities
Vulnerability ID | VCID-hdsj-ya24-9uhk |
Aliases |
GHSA-g585-crjf-vhwq
|
Summary | TYPO3 Denial of Service in Frontend Record Registration TYPO3’s built-in record registration functionality (aka `basic shopping cart`) using recs URL parameters is vulnerable to denial of service. Failing to properly ensure that anonymous user sessions are valid, attackers can use this vulnerability in order to create an arbitrary amount of individual session-data records in the database. |
Status | Published |
Exploitability | None |
Weighted Severity | None |
Risk | None |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
cvssv3.1_qr | HIGH | https://github.com/advisories/GHSA-g585-crjf-vhwq |
cvssv3.1 | 7.5 | https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2018-12-11-7.yaml |
generic_textual | HIGH | https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2018-12-11-7.yaml |
cvssv3.1 | 7.5 | https://github.com/TYPO3/typo3 |
generic_textual | HIGH | https://github.com/TYPO3/typo3 |
cvssv3.1 | 7.5 | https://github.com/TYPO3/typo3/commit/05011d1248c54d00960e344fd920a6246da92415 |
generic_textual | HIGH | https://github.com/TYPO3/typo3/commit/05011d1248c54d00960e344fd920a6246da92415 |
cvssv3.1 | 7.5 | https://github.com/TYPO3/typo3/commit/fc2b4b9fb978088267f83e73cd401d4371dd40e3 |
generic_textual | HIGH | https://github.com/TYPO3/typo3/commit/fc2b4b9fb978088267f83e73cd401d4371dd40e3 |
cvssv3.1 | 7.5 | https://typo3.org/security/advisory/typo3-core-sa-2018-012 |
generic_textual | HIGH | https://typo3.org/security/advisory/typo3-core-sa-2018-012 |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
No EPSS data available for this vulnerability.
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-01T12:11:09.565149+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-g585-crjf-vhwq/GHSA-g585-crjf-vhwq.json | 36.1.3 |