CVE-2023-47125

TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions DOM processing instructions are not handled correctly. This allows bypassing the cross-site scripting mechanism of typo3/html-sanitizer. This vulnerability has been addressed in versions 1.5.3 and 2.1.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*

History

21 Nov 2023, 02:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Typo3 typo3
Typo3 html Sanitizer
Typo3
CPE cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*
References () https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-mm79-jhqm-9j54 - () https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-mm79-jhqm-9j54 - Vendor Advisory
References () https://typo3.org/security/advisory/typo3-core-sa-2023-007 - () https://typo3.org/security/advisory/typo3-core-sa-2023-007 - Vendor Advisory
References () https://github.com/TYPO3/html-sanitizer/commit/b8f90717251d968c49dc77f8c1e5912e2fbe0dff - () https://github.com/TYPO3/html-sanitizer/commit/b8f90717251d968c49dc77f8c1e5912e2fbe0dff - Patch

14 Nov 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-14 20:15

Updated : 2023-12-10 15:26


NVD link : CVE-2023-47125

Mitre link : CVE-2023-47125

CVE.ORG link : CVE-2023-47125


JSON object : View

Products Affected

typo3

  • html_sanitizer
  • typo3
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')