First published: Tue Sep 13 2022(Updated: )
TYPO3-CORE-SA-2022-009: Stored Cross-Site Scripting via FileDumpController
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=10.0.0<10.4.32>=11.0.0<11.5.16 | |
composer/typo3/cms-core | >=10.0.0<10.4.32>=11.0.0<11.5.16 | |
Typo3 Typo3 | >=7.0.0<=7.6.57 | |
Typo3 Typo3 | >=8.0.0<=8.7.47 | |
Typo3 Typo3 | >=9.0.0<=9.5.36 | |
Typo3 Typo3 | >=10.0.0<=10.4.31 | |
Typo3 Typo3 | >=11.0.0<=11.5.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36107 is a vulnerability in TYPO3 that allows stored cross-site scripting (XSS) attacks via the FileDumpController component.
CVE-2022-36107 has a severity rating of 5.4 (medium).
TYPO3 versions 10.0.0 to 10.4.32, 11.0.0 to 11.5.16, 7.0.0 to 7.6.57, 8.0.0 to 8.7.47, 9.0.0 to 9.5.36, and 10.0.0 to 10.4.31 are affected by CVE-2022-36107.
To fix CVE-2022-36107, update your TYPO3 installation to versions 10.4.33, 11.5.17, or apply the patch provided by TYPO3.
You can find more information about CVE-2022-36107 on TYPO3's security advisory page: https://typo3.org/security/advisory/typo3-core-sa-2022-009