First published: Tue Dec 13 2022(Updated: )
> ### CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L/E:F/RL:O/RC:C` (5.3) ### Problem Due to the lack of handling user-submitted [YAML placeholder expressions](https://docs.typo3.org/m/typo3/reference-coreapi/main/en-us/Configuration/Yaml/YamlApi.html#custom-placeholder-processing) in the site configuration backend module, attackers could expose sensitive internal information, such as system configuration or HTTP request messages of other website visitors. A valid backend user account having administrator privileges is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above. ### Credits Thanks to TYPO3 core & security team member Oliver Hader who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2022-016](https://typo3.org/security/advisory/typo3-core-sa-2022-016)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms-core | >=10.0.0<10.4.33>=11.0.0<11.5.20>=12.0.0<12.1.1 | |
composer/typo3/cms | >=10.0.0<10.4.33>=11.0.0<11.5.20>=12.0.0<12.1.1 | |
Typo3 Typo3 | >=9.0.0<9.5.38 | |
Typo3 Typo3 | >=10.0.0<10.4.33 | |
Typo3 Typo3 | >=11.0.0<11.5.20 | |
Typo3 Typo3 | >=12.0.0<12.1.1 | |
composer/typo3/cms | >=12.0.0<12.1.1 | 12.1.1 |
composer/typo3/cms | >=11.0.0<11.5.20 | 11.5.20 |
composer/typo3/cms | >=10.0.0<10.4.33 | 10.4.33 |
composer/typo3/cms-core | >=12.0.0<12.1.1 | 12.1.1 |
composer/typo3/cms-core | >=11.0.0<11.5.20 | 11.5.20 |
composer/typo3/cms-core | >=10.0.0<10.4.33 | 10.4.33 |
composer/typo3/cms-core | >=9.0.0<9.5.38 | 9.5.38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
TYPO3-CORE-SA-2022-016 is a vulnerability that allows sensitive information disclosure in TYPO3 versions prior to 9.5.38, 10.4.33, 11.5.20, and 12.1.1.
TYPO3-CORE-SA-2022-016 works by exploiting the lack of handling user-submitted YAML placeholder expressions in the site configuration backend module.
TYPO3-CORE-SA-2022-016 has a severity level of medium (4.9).
To fix TYPO3-CORE-SA-2022-016, update TYPO3 to versions 9.5.38, 10.4.33, 11.5.20, or 12.1.1.
More information about TYPO3-CORE-SA-2022-016 can be found at the TYPO3 security advisory page (https://typo3.org/security/advisory/typo3-core-sa-2022-016) and the TYPO3 GitHub security advisory page (https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr).