First published: Tue Sep 13 2022(Updated: )
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded. Users are advised to update to TYPO3 version 11.5.16 to resolve this issue. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=11.0.0<11.5.16 | |
composer/typo3/cms-core | >=11.0.0<11.5.16 | |
Typo3 Typo3 | >=11.4.0<=11.5.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-36104.
The title of the vulnerability is TYPO3-CORE-SA-2022-006: Denial of Service in Page Error Handling.
The affected software is TYPO3 CMS Core version 11.0.0 to 11.5.16 and PHP version 11.0.0 to 11.5.16.
To fix the vulnerability, update TYPO3 CMS Core and PHP to versions above 11.5.16.
You can find more information at the following reference: [TYPO3-CORE-SA-2022-006](https://typo3.org/security/advisory/typo3-core-sa-2022-006).