TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions DOM processing instructions are not handled correctly. This allows bypassing the cross-site scripting mechanism of typo3/html-sanitizer. This vulnerability has been addressed in versions 1.5.3 and 2.1.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
References | () https://github.com/TYPO3/html-sanitizer/commit/b8f90717251d968c49dc77f8c1e5912e2fbe0dff - Patch | |
References | () https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-mm79-jhqm-9j54 - Vendor Advisory | |
References | () https://typo3.org/security/advisory/typo3-core-sa-2023-007 - Vendor Advisory |
21 Nov 2023, 02:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CPE | cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:* |
|
References | () https://github.com/TYPO3/html-sanitizer/commit/b8f90717251d968c49dc77f8c1e5912e2fbe0dff - Patch | |
References | () https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-mm79-jhqm-9j54 - Vendor Advisory | |
References | () https://typo3.org/security/advisory/typo3-core-sa-2023-007 - Vendor Advisory | |
First Time |
Typo3 typo3
Typo3 html Sanitizer Typo3 |
14 Nov 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-14 20:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-47125
Mitre link : CVE-2023-47125
CVE.ORG link : CVE-2023-47125
JSON object : View
Products Affected
typo3
- typo3
- html_sanitizer
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')