First published: Tue Apr 27 2021(Updated: )
Bootstrap Package is a theme for TYPO3. It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix. Update to version 7.1.2, 8.0.8, 9.1.4, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Typo3 Typo3 | <7.1.2 | |
Typo3 Typo3 | >=8.0.0<8.0.8 | |
Typo3 Typo3 | >=9.0.0<9.0.4 | |
Typo3 Typo3 | >=9.1.0<9.1.3 | |
Typo3 Typo3 | >=10.0.0<10.0.10 | |
Typo3 Typo3 | >=11.0.0<11.0.3 |
https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21365 is a vulnerability in the Bootstrap Package theme for TYPO3 that allows for cross-site scripting (XSS) attacks.
CVE-2021-21365 has a severity score of 5.4, which is considered medium.
TYPO3 versions 7.1.2 up to exclusive, 8.0.0 up to inclusive (8.0.8 exclusive), 9.0.0 up to inclusive (9.0.4 exclusive), 9.1.0 up to inclusive (9.1.3 exclusive), 10.0.0 up to inclusive (10.0.10 exclusive), and 11.0.0 up to inclusive (11.0.3 exclusive) are affected by CVE-2021-21365.
No, a valid backend user account is needed to exploit CVE-2021-21365.
To fix CVE-2021-21365, TYPO3 users should update to a version where the vulnerability has been fixed and apply the necessary security patches.