CVE-2023-47125
By-passing Cross-Site Scripting Protection in HTML Sanitizer
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions DOM processing instructions are not handled correctly. This allows bypassing the cross-site scripting mechanism of typo3/html-sanitizer. This vulnerability has been addressed in versions 1.5.3 and 2.1.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
TYPO3 es un sistema de gestión de contenido web basado en PHP de código abierto publicado bajo GNU GPL. En las versiones afectadas, las instrucciones de procesamiento DOM no se manejan correctamente. Esto permite evitar el mecanismo de Cross-Site Scripting de typo3/html-sanitizer. Esta vulnerabilidad se ha solucionado en las versiones 1.5.3 y 2.1.4. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-10-30 CVE Reserved
- 2023-11-14 CVE Published
- 2024-08-29 CVE Updated
- 2024-10-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/TYPO3/html-sanitizer/commit/b8f90717251d968c49dc77f8c1e5912e2fbe0dff | 2023-11-21 |
URL | Date | SRC |
---|---|---|
https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-mm79-jhqm-9j54 | 2023-11-21 | |
https://typo3.org/security/advisory/typo3-core-sa-2023-007 | 2023-11-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Typo3 Search vendor "Typo3" | Html Sanitizer Search vendor "Typo3" for product "Html Sanitizer" | >= 1.0.0 < 1.5.3 Search vendor "Typo3" for product "Html Sanitizer" and version " >= 1.0.0 < 1.5.3" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Html Sanitizer Search vendor "Typo3" for product "Html Sanitizer" | >= 2.0.0 < 2.1.4 Search vendor "Typo3" for product "Html Sanitizer" and version " >= 2.0.0 < 2.1.4" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | >= 8.7.42 < 8.7.55 Search vendor "Typo3" for product "Typo3" and version " >= 8.7.42 < 8.7.55" | elts |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | >= 9.5.29 < 9.5.44 Search vendor "Typo3" for product "Typo3" and version " >= 9.5.29 < 9.5.44" | elts |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | >= 10.4.19 < 10.4.41 Search vendor "Typo3" for product "Typo3" and version " >= 10.4.19 < 10.4.41" | elts |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | >= 11.3.2 < 11.5.33 Search vendor "Typo3" for product "Typo3" and version " >= 11.3.2 < 11.5.33" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | >= 12.0.0 < 12.4.8 Search vendor "Typo3" for product "Typo3" and version " >= 12.0.0 < 12.4.8" | - |
Affected
|