First published: Tue May 12 2020(Updated: )
In TYPO3 CMS greater than or equal to 9.5.12 and less than 9.5.17, and greater than or equal to 10.2.0 and less than 10.4.2, it has been discovered that link tags generated by typolink functionality are vulnerable to cross-site scripting; properties being assigned as HTML attributes have not been parsed correctly. This has been fixed in 9.5.17 and 10.4.2.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms-core | >=10.0.0<10.4.2>=9.0.0<9.5.17 | |
composer/typo3/cms | >=10.0.0<10.4.2>=9.0.0<9.5.17 | |
Typo3 Typo3 | >=9.5.12<9.5.17 | |
Typo3 Typo3 | >=10.2.0<10.4.2 | |
composer/typo3/cms | >=9.0.0<9.5.17 | 9.5.17 |
composer/typo3/cms | >=10.0.0<10.4.2 | 10.4.2 |
composer/typo3/cms-core | >=9.0.0<9.5.17 | 9.5.17 |
composer/typo3/cms-core | >=10.0.0<10.4.2 | 10.4.2 |
>=9.5.12<9.5.17 | ||
>=10.2.0<10.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
TYPO3-CORE-SA-2020-003 is a vulnerability in TYPO3 CMS that allows for cross-site scripting attacks.
TYPO3 CMS versions 9.5.12 to 9.5.17 and 10.2.0 to 10.4.2 are affected.
TYPO3-CORE-SA-2020-003 has a severity rating of 5.4, which is considered medium.
TYPO3-CORE-SA-2020-003 can be exploited by injecting malicious code through link tags generated by typolink functionality.
Yes, patches and fixes are available for TYPO3-CORE-SA-2020-003. It is recommended to update TYPO3 CMS to versions 9.5.18 or 10.4.3 to mitigate the vulnerability.