diff options
author | joneum <joneum@FreeBSD.org> | 2019-12-25 20:25:56 +0800 |
---|---|---|
committer | joneum <joneum@FreeBSD.org> | 2019-12-25 20:25:56 +0800 |
commit | f825e5b0d5ac9567f718b4db5f7dad82efbedcea (patch) | |
tree | c26c5f72f127da18259cde35b9321c74627a3385 | |
parent | 8cd3921cf893303949dd89658a73bfa8526ebcbb (diff) | |
download | freebsd-ports-gnome-f825e5b0d5ac9567f718b4db5f7dad82efbedcea.tar.gz freebsd-ports-gnome-f825e5b0d5ac9567f718b4db5f7dad82efbedcea.tar.zst freebsd-ports-gnome-f825e5b0d5ac9567f718b4db5f7dad82efbedcea.zip |
Add entry for typo3
PR: 242707 242708
Sponsored by: Netzkommune GmbH
-rw-r--r-- | security/vuxml/vuln.xml | 87 |
1 files changed, 87 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 1863aa0c85d9..3a9b6ba3115e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,93 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1c9178aa-2709-11ea-9673-4c72b94353b5"> + <topic>typo3 -- multiple vulnerabilities</topic> + <affects> + <package> + <name>typo3-8</name> + <range><lt>8.7.30</lt></range> + </package> + <package> + <name>typo3-9</name> + <range><lt>9.5.13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Typo3 core team reports:</p> + <blockquote cite="https://typo3.org/article/typo3-10-2-1-9-5-12-and-8-7-30-security-releases-published"> + <p>It has been discovered that the output of field validation errors in the Form Framework is vulnerable + to cross-site scripting.</p> + <p>It has been discovered that t3:// URL handling and typolink functionality are vulnerable to cross-site + scripting. Not only regular backend forms are affected but also frontend extensions which use the rendering + with typolink.</p> + <p>It has been discovered that the output table listing in the Files backend module is vulnerable to cross-site + scripting when a file extension contains malicious sequences. Access to the file system of the server - either + directly or through synchronization - is required to exploit the vulnerability.</p> + <p>It has been discovered that the extraction of manually uploaded ZIP archives in Extension Manager is vulnerable + to directory traversal. Admin privileges are required in order to exploit this vulnerability. Since TYPO3 v9 LTS, + System Maintainer privileges are required as well.</p> + <p>Failing to properly escape user submitted content, class QueryGenerator is vulnerable to SQL injection. + Having system extension ext:lowlevel installed and a valid backend user having administrator privileges are + required to exploit this vulnerability.</p> + <p>It has been discovered that classes QueryGenerator and QueryView are vulnerable to insecure deserialization. + Requirements for successfully exploiting this vulnerability (one of the following): + - having system extension ext:lowlevel (Backend Module: DB Check) installed and valid backend user having + administrator privileges + - having system extension ext:sys_action installed and valid backend user having limited privileges</p> + <p>TYPO3 allows to upload files either in the backend user interface as well as in custom developed extensions. + To reduce the possibility to upload potential malicious code TYPO3 uses the fileDenyPattern to deny e.g. user + submitted PHP scripts from being persisted. Besides that it is possible for any editor to upload file assets + using the file module (fileadmin) or changing their avatar image shown in the TYPO3 backend. + + Per default TYPO3 allows to upload and store HTML and SVG files as well using the mentioned functionalities. + Custom extension implementations probably would also accept those files when only the fileDenyPattern is evaluated. + + Since HTML and SVG files - which might contain executable JavaScript code per W3C standard - could be directly + displayed in web clients, the whole web application is exposed to be vulnerable concerning Cross-Site Scripting. + Currently the following scenarios are known - given an authenticated regular editor is able to upload files using + the TYPO3 backend: + - directly target a potential victim to a known public resource in a URL, e.g. /fileadmin/malicious.svg or + /fileadmin/malicious.html + - using the TypoScript content object “SVG” (implemented in class ScalableVectorGraphicsContentObject) + having renderMode set to inline for SVG files (available since TYPO3 v9.0) + - custom implementations that directly output and render markup of HTML and SVG files + + SVG files that are embedded using an img src=”malicious.svg” tag are not vulnerable since potential + scripts are not executed in these scenarios (see https://www.w3.org/wiki/SVG_Security). The icon API of TYPO3 + is not scope of this announcement since SVG icons need to be registered using an individual implementation, + which is not considered as user submitted content.</p> + <p>It has been discovered that request handling in Extbase can be vulnerable to insecure deserialization. + User submitted payload has to be signed with a corresponding HMAC-SHA1 using the sensitive TYPO3 encryptionKey + as secret - invalid or unsigned payload is not deserialized. + + However, since sensitive information could have been leaked by accident (e.g. in repositories or in commonly + known and unprotected backup files), there is the possibility that attackers know the private encryptionKey + and are able to calculate the required HMAC-SHA1 to allow a malicious payload to be deserialized. + + Requirements for successfully exploiting this vulnerability (all of the following): + - rendering at least one Extbase plugin in the frontend + - encryptionKey has been leaked (from LocalConfiguration.php or corresponding .env file). </p> + </blockquote> + </body> + </description> + <references> + <url>https://typo3.org/security/advisory/typo3-core-sa-2019-021/</url> + <url>https://typo3.org/security/advisory/typo3-core-sa-2019-022/</url> + <url>https://typo3.org/security/advisory/typo3-core-sa-2019-023/</url> + <url>https://typo3.org/security/advisory/typo3-core-sa-2019-024/</url> + <url>https://typo3.org/security/advisory/typo3-core-sa-2019-025/</url> + <url>https://typo3.org/security/advisory/typo3-core-sa-2019-026/</url> + <url>https://typo3.org/security/advisory/typo3-psa-2019-010/</url> + <url>https://typo3.org/security/advisory/typo3-psa-2019-011/</url> + </references> + <dates> + <discovery>2019-12-17</discovery> + <entry>2019-12-25</entry> + </dates> + </vuln> + <vuln vid="ad3451b9-23e0-11ea-8b36-f1925a339a82"> <topic>e2fsprogs -- maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck</topic> <affects> |