GHSA-g7hw-jh4p-75wr: TYPO3 Cross-Site Scripting in Filelist Module
It has been discovered that the output table listing in the “Files” backend module is vulnerable to cross-site scripting when a file extension contains malicious sequences.
Access to the file system of the server - either directly or through synchronization - is required to exploit the vulnerability.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2019-12-17-3.yaml
- github.com/TYPO3/typo3
- github.com/TYPO3/typo3/commit/044d7dbe28382919c765b6b815d420f480a1ac70
- github.com/TYPO3/typo3/commit/96b122b756cc778697845d48210b0993c0724b5f
- github.com/TYPO3/typo3/commit/fcc1bab07027ba9d8140a91006d3cda1244d6298
- github.com/advisories/GHSA-g7hw-jh4p-75wr
- typo3.org/security/advisory/typo3-core-sa-2019-023
Detect and mitigate GHSA-g7hw-jh4p-75wr with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →