git: 9f2b97cf9002 - main - security/vuxml: Record typo3-1{12} vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 15 Nov 2023 14:45:09 UTC
The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=9f2b97cf900250ac7f00b93fdd9a0904e9ecffaf commit 9f2b97cf900250ac7f00b93fdd9a0904e9ecffaf Author: Fernando Apesteguía <fernape@FreeBSD.org> AuthorDate: 2023-11-15 13:22:57 +0000 Commit: Fernando Apesteguía <fernape@FreeBSD.org> CommitDate: 2023-11-15 14:44:30 +0000 security/vuxml: Record typo3-1{12} vulnerabilities PR: 275073 275074 --- security/vuxml/vuln/2023.xml | 56 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 56 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index de081674c39c..7ef303a9cc20 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,59 @@ + <vuln vid="7cc003cb-83b9-11ee-957d-b42e991fc52e"> + <topic>typo3 -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>typo3-11</name> + <name>typo3-12</name> + <range><lt>11.5.33</lt></range> + <range><lt>12.4.33</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>security-advisories@github.com reports:</p> + <blockquote cite="https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019"> + <p>Weak Authentication in Session Handling in typo3/cms-core: + In typo3 installations there are always + at least two different sites. Eg. first.example.org and + second.example.com. In affected versions a session cookie + generated for the first site can be reused on the second site + without requiring additional authentication. This + vulnerability has been addressed in versions 8.7.55, 9.5.44, + 10.4.41, 11.5.33, and 12.4.8. Users are advised to upgrade. + There are no known workarounds for this vulnerability.</p> + <p>Information Disclosure in Install Tool in typo3/cms-install: + In affected versions the login screen of the standalone + install tool discloses the full path of the transient data + directory (e.g. /var/www/html/var/transient/). This applies + to composer-based scenarios only - classic non-composer + installations are not affected. This issue has been addressed + in version 12.4.8. Users are advised to upgrade. There are + no known workarounds for this vulnerability. + </p> + <p>By-passing Cross-Site Scripting Protection in HTML Sanitizer: + In affected versions DOM processing instructions are not + handled correctly. This allows bypassing the cross-site + scripting mechanism of typo3/html-sanitizer. This + vulnerability has been addressed in versions 1.5.3 and 2.1.4. + Users are advised to upgrade. There are no known workarounds + for this vulnerability.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-47125</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2023-47125</url> + <cvename>CVE-2023-47126</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2023-47126</url> + <cvename>CVE-2023-47127</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2023-47127</url> + </references> + <dates> + <discovery>2023-11-14</discovery> + <entry>2023-11-15</entry> + </dates> + </vuln> + <vuln vid="31f45d06-7f0e-11ee-94b4-6cc21735f730"> <topic>postgresql-server -- Memory disclosure in aggregate function calls</topic> <affects>