TYPO3 Fluid Engine (package `typo3fluid/fluid`) before versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like `{showFullName ? fullName : defaultValue}`. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) versions as well: TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.4) and TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1).
References
Link | Resource |
---|---|
https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d | Patch Third Party Advisory |
https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47 | Exploit Third Party Advisory |
https://typo3.org/security/advisory/typo3-core-sa-2019-013 | Exploit Third Party Advisory |
https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d | Patch Third Party Advisory |
https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47 | Exploit Third Party Advisory |
https://typo3.org/security/advisory/typo3-core-sa-2019-013 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 05:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 4.7 |
References | () https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d - Patch, Third Party Advisory | |
References | () https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47 - Exploit, Third Party Advisory | |
References | () https://typo3.org/security/advisory/typo3-core-sa-2019-013 - Exploit, Third Party Advisory |
Information
Published : 2020-10-08 21:15
Updated : 2024-11-21 05:05
NVD link : CVE-2020-15241
Mitre link : CVE-2020-15241
CVE.ORG link : CVE-2020-15241
JSON object : View
Products Affected
typo3
- fluid_engine
- typo3