First published: Tue Nov 17 2020(Updated: )
### Problem It has been discovered that RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability with current PHP versions of supported and maintained system distributions. At least with _libxml2_ version 2.9, the processing of XML external entities is disabled per default - and cannot be exploited. Besides that, a valid backend user account is needed. ### Solution Update to TYPO3 version 10.4.10 that fixes the problem described.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms-core | >=10.0.0<10.4.10 | |
composer/typo3/cms | >=10.0.0<10.4.10 | |
Typo3 Typo3 | >=10.0.0<10.4.10 | |
composer/typo3/cms | >=10.0.0<10.4.10 | 10.4.10 |
composer/typo3/cms-core | >=10.0.0<10.4.10 | 10.4.10 |
>=10.0.0<10.4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
TYPO3-CORE-SA-2020-012 is a vulnerability in TYPO3 where RSS widgets are susceptible to XML external entity processing, allowing attackers to potentially access sensitive information.
The severity of TYPO3-CORE-SA-2020-012 is low, with a severity rating of 3.7 out of 10.
TYPO3 versions from 10.0.0 up to but excluding 10.4.10 are affected by the TYPO3-CORE-SA-2020-012 vulnerability.
An attacker can exploit the TYPO3-CORE-SA-2020-012 vulnerability by manipulating XML external entities in RSS widgets to potentially access sensitive information.
Yes, TYPO3 has released a fix for the TYPO3-CORE-SA-2020-012 vulnerability. It is recommended to update to TYPO3 version 10.4.10 or higher to address the issue.