First published: Tue Dec 13 2022(Updated: )
TYPO3 is an open source PHP based web content management system. In versions prior to 9.5.38, 10.4.33, 11.5.20, and 12.1.1, requesting invalid or non-existing resources via HTTP triggers the page error handler, which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded. This vulnerability is very similar, but not identical, to the one described in CVE-2021-21359. This issue is patched in versions 9.5.38 ELTS, 10.4.33, 11.5.20 or 12.1.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms-core | >=10.0.0<10.4.33>=11.0.0<11.5.20 | |
composer/typo3/cms | >=10.0.0<10.4.33>=11.0.0<11.5.20 | |
TYPO3 | >=9.0.0<9.5.38 | |
TYPO3 | >=10.0.0<10.4.33 | |
TYPO3 | >=11.0.0<11.5.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-23500.
The severity of CVE-2022-23500 is high with a CVSS score of 7.5.
CVE-2022-23500 affects TYPO3 versions prior to 9.5.38, 10.4.33, 11.5.20, and 12.1.1.
CVE-2022-23500 can lead to a denial of service (DoS) attack in the page error handling of TYPO3.
To fix CVE-2022-23500, you should update TYPO3 to version 9.5.38, 10.4.33, 11.5.20, or 12.1.1.