GHSA-wg8h-gxf4-g4gh: TYPO3 Cross-Site Scripting in Online Media Asset Rendering
Failing to properly encode user input, online media asset rendering (*.youtube and *.vimeo files) is vulnerable to cross-site scripting. A valid backend user account or write access on the server system (e.g. SFTP) is needed in order to exploit this vulnerability.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/2018-12-11-1.yaml
- github.com/TYPO3-CMS/core
- github.com/TYPO3-CMS/core/commit/23800859368e2af60604ff27f3eed9971ccd9fbd
- github.com/TYPO3-CMS/core/commit/f9e5e255f41c248e115b2a755b797ce48d10d72a
- github.com/advisories/GHSA-wg8h-gxf4-g4gh
- typo3.org/security/advisory/typo3-core-sa-2018-006
Detect and mitigate GHSA-wg8h-gxf4-g4gh with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →