CVE-2022-31046
Information Disclosure via Export Module in TYPO3 CMS
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, the export functionality fails to limit the result set to allowed columns of a particular database table. This way, authenticated users can export internal details of database tables they already have access to. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 fix the problem described above. In order to address this issue, access to mentioned export functionality is completely denied for regular backend users.
TYPO3 es un sistema de administración de contenidos web de código abierto. En versiones anteriores a 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29 y 11.5.11, la funcionalidad de exportación no limitaba el conjunto de resultados a las columnas permitidas de una tabla de base de datos concreta. De este modo, los usuarios autenticados pueden exportar detalles internos de las tablas de la base de datos a las que ya presentan acceso. TYPO3 versiones 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 corrigen el problema descrito anteriormente. Para abordar este problema, el acceso a la mencionada funcionalidad de exportación está completamente denegado para los usuarios habituales del backend
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-18 CVE Reserved
- 2022-06-14 CVE Published
- 2024-01-05 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/TYPO3/typo3/security/advisories/GHSA-8gmv-9hwg-w89g | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/TYPO3/typo3/commit/7447a3d1283017d2ee08737a7972c720001a93e9 | 2022-06-23 |
URL | Date | SRC |
---|---|---|
https://typo3.org/security/advisory/typo3-core-sa-2022-001 | 2022-06-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | >= 7.0.0 < 7.6.57 Search vendor "Typo3" for product "Typo3" and version " >= 7.0.0 < 7.6.57" | elts |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | >= 8.0.0 < 8.7.47 Search vendor "Typo3" for product "Typo3" and version " >= 8.0.0 < 8.7.47" | elts |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | >= 9.0.0 < 9.5.35 Search vendor "Typo3" for product "Typo3" and version " >= 9.0.0 < 9.5.35" | elts |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | >= 10.0.0 < 10.4.29 Search vendor "Typo3" for product "Typo3" and version " >= 10.0.0 < 10.4.29" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | >= 11.0.0 < 11.5.11 Search vendor "Typo3" for product "Typo3" and version " >= 11.0.0 < 11.5.11" | - |
Affected
|