GHSA-75mx-chcf-2q32: TYPO3 Cross-Site Scripting vulnerability in typolinks
All link fields within the TYPO3 installation are vulnerable to Cross-Site Scripting as authorized editors can insert javascript commands by using the url scheme javascript:
.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2015-12-15-2.yaml
- github.com/TYPO3/typo3
- github.com/TYPO3/typo3/commit/25a1473907f0f4b2bb0147c661981940c57a4555
- github.com/TYPO3/typo3/commit/de1755a6dcff9b037c6d5a1fa340ba100aff054a
- github.com/advisories/GHSA-75mx-chcf-2q32
- typo3.org/security/advisory/typo3-core-sa-2015-012
- typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-012
Detect and mitigate GHSA-75mx-chcf-2q32 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →