Package: typo3-src
Severity: critical
Tags: security

Component Type: TYPO3 Core

Affected Versions: 4.4.0 up to 4.4.14, 4.5.0 up to 4.5.14, 4.6.0 up to
4.6.7 and development releases of the 4.7 branch.
Vulnerable subcomponent: Exception Handler



Vulnerability Type: Cross-Site Scripting
Severity: Medium
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C

Problem Description: Failing to properly encode the output, the default
TYPO3 Exception Handler is susceptible to Cross-Site Scripting.
We are not aware of a possibilty to exploit this vulnerability without
third party extensions being installed that put user input in exception
messages.
However it has come to our attention that extensions using the extbase
MVC framework can be used to exploit this vulnerability if these
extensions accept objects in controller actions.
In general and especially when in doubt if the above conditions are met,
we highly recommend users of affected versions to update as soon as
possible.

Imortant Note: In case you have configured your own exception handler
for TYPO3 you need to make sure that the exception messages are properly
encoded within this exception handler before they are presented.


-- 
 MfG, Christian Welzel

  GPG-Key:     http://www.camlann.de/de/pgpkey.html
  Fingerprint: 4F50 19BF 3346 36A6 CFA9 DBDC C268 6D24 70A1 AD15



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to