CVE-2024-34357
TYPO3 vulnerable to Cross-Site Scripting in ShowImageController
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
TYPO3 is an enterprise content management system. Starting in version 9.0.0 and prior to versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, and 13.1.1, failing to properly encode user-controlled values in file entities, the `ShowImageController` (`_eID tx_cms_showpic_`) is vulnerable to cross-site scripting. Exploiting this vulnerability requires a valid backend user account with access to file entities. TYPO3 versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, 13.1.1 fix the problem described.
TYPO3 es un sistema de gestión de contenidos empresariales. A partir de la versión 9.0.0 y anteriores a las versiones 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS y 13.1.1, al no codificar correctamente los valores controlados por el usuario en las entidades de archivos, `ShowImageController ` (`_eID tx_cms_showpic_`) es vulnerable a Cross Site Scripting. Para explotar esta vulnerabilidad se requiere una cuenta de usuario de backend válida con acceso a las entidades de archivos. Las versiones de TYPO3 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, 13.1.1 solucionan el problema descrito.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-05-02 CVE Reserved
- 2024-05-14 CVE Published
- 2024-05-15 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/TYPO3/typo3/commit/376474904f6b9a54dc1b785a2e45277cbd13b0d7 | X_refsource_misc | |
https://github.com/TYPO3/typo3/commit/b31d05d1da3eeaeead2d19eb43b1c3f9c88e15ee | X_refsource_misc | |
https://github.com/TYPO3/typo3/commit/d774642381354d3bf5095a5a26e18acd2767f0b1 | X_refsource_misc | |
https://github.com/TYPO3/typo3/security/advisories/GHSA-hw6c-6gwq-3m3m | X_refsource_confirm | |
https://typo3.org/security/advisory/typo3-core-sa-2024-009 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
TYPO3 Search vendor "TYPO3" | Typo3 Search vendor "TYPO3" for product "Typo3" | >= 9.0.0 < 9.5.48 Search vendor "TYPO3" for product "Typo3" and version " >= 9.0.0 < 9.5.48" | en |
Affected
| ||||||
TYPO3 Search vendor "TYPO3" | Typo3 Search vendor "TYPO3" for product "Typo3" | >= 10.0.0 < 10.4.45 Search vendor "TYPO3" for product "Typo3" and version " >= 10.0.0 < 10.4.45" | en |
Affected
| ||||||
TYPO3 Search vendor "TYPO3" | Typo3 Search vendor "TYPO3" for product "Typo3" | >= 11.0.0 < 11.5.37 Search vendor "TYPO3" for product "Typo3" and version " >= 11.0.0 < 11.5.37" | en |
Affected
| ||||||
TYPO3 Search vendor "TYPO3" | Typo3 Search vendor "TYPO3" for product "Typo3" | >= 12.0.0 < 12.4.15 Search vendor "TYPO3" for product "Typo3" and version " >= 12.0.0 < 12.4.15" | en |
Affected
| ||||||
TYPO3 Search vendor "TYPO3" | Typo3 Search vendor "TYPO3" for product "Typo3" | >= 13.0.0 < 13.1.1 Search vendor "TYPO3" for product "Typo3" and version " >= 13.0.0 < 13.1.1" | en |
Affected
|