// For flags

CVE-2021-21365

Cross-Site Scripting in Content Rendering

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Bootstrap Package is a theme for TYPO3. It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix. Update to version 7.1.2, 8.0.8, 9.1.4, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/.

Bootstrap Package es un tema para TYPO3. Se ha descubierto que la renderización de contenido en la interfaz del sitio web es vulnerable a ataques de tipo cross-site scripting. Es necesario una cuenta de usuario de backend válida para explotar esta vulnerabilidad. Los usuarios de la extensión que hayan sobrescrito las plantillas afectadas con código personalizado deben aplicar manualmente la corrección de seguridad. Actualiza a versiones 7.1.2, 8.0.8, 9.1.4, 10.0.10 o 11.0.3 del paquete Bootstrap que corrige el problema descrito. La versión actualizada está disponible en el administrador de extensiones TYPO3, Packagist y en https://extensions.typo3.org/extension/download/bootstrap_package/

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-22 CVE Reserved
  • 2021-04-27 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Typo3
Search vendor "Typo3"
Typo3
Search vendor "Typo3" for product "Typo3"
< 7.1.2
Search vendor "Typo3" for product "Typo3" and version " < 7.1.2"
-
Affected
Typo3
Search vendor "Typo3"
Typo3
Search vendor "Typo3" for product "Typo3"
>= 8.0.0 < 8.0.8
Search vendor "Typo3" for product "Typo3" and version " >= 8.0.0 < 8.0.8"
-
Affected
Typo3
Search vendor "Typo3"
Typo3
Search vendor "Typo3" for product "Typo3"
>= 9.0.0 < 9.0.4
Search vendor "Typo3" for product "Typo3" and version " >= 9.0.0 < 9.0.4"
-
Affected
Typo3
Search vendor "Typo3"
Typo3
Search vendor "Typo3" for product "Typo3"
>= 9.1.0 < 9.1.3
Search vendor "Typo3" for product "Typo3" and version " >= 9.1.0 < 9.1.3"
-
Affected
Typo3
Search vendor "Typo3"
Typo3
Search vendor "Typo3" for product "Typo3"
>= 10.0.0 < 10.0.10
Search vendor "Typo3" for product "Typo3" and version " >= 10.0.0 < 10.0.10"
-
Affected
Typo3
Search vendor "Typo3"
Typo3
Search vendor "Typo3" for product "Typo3"
>= 11.0.0 < 11.0.3
Search vendor "Typo3" for product "Typo3" and version " >= 11.0.0 < 11.0.3"
-
Affected