First published: Tue Dec 13 2022(Updated: )
TYPO3-CORE-SA-2022-016: Sensitive Information Disclosure via YAML Placeholder Expressions in Site Configuration
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms-core | >=10.0.0<10.4.33>=11.0.0<11.5.20>=12.0.0<12.1.1 | |
composer/typo3/cms | >=10.0.0<10.4.33>=11.0.0<11.5.20>=12.0.0<12.1.1 | |
Typo3 Typo3 | >=9.0.0<9.5.38 | |
Typo3 Typo3 | >=10.0.0<10.4.33 | |
Typo3 Typo3 | >=11.0.0<11.5.20 | |
Typo3 Typo3 | >=12.0.0<12.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
TYPO3-CORE-SA-2022-016 is a vulnerability that allows sensitive information disclosure in TYPO3 versions prior to 9.5.38, 10.4.33, 11.5.20, and 12.1.1.
TYPO3-CORE-SA-2022-016 works by exploiting the lack of handling user-submitted YAML placeholder expressions in the site configuration backend module.
TYPO3-CORE-SA-2022-016 has a severity level of medium (4.9).
To fix TYPO3-CORE-SA-2022-016, update TYPO3 to versions 9.5.38, 10.4.33, 11.5.20, or 12.1.1.
More information about TYPO3-CORE-SA-2022-016 can be found at the TYPO3 security advisory page (https://typo3.org/security/advisory/typo3-core-sa-2022-016) and the TYPO3 GitHub security advisory page (https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr).