GHSA-mxjf-hc9v-xgv2: ExtJS JavaScript framework used in TYPO3 vulnerable to Cross-site Scripting
Failing to properly validate the HTTP host-header TYPO3 CMS is susceptible to host spoofing. TYPO3 uses the HTTP host-header to generate absolute URLs in several places like 404 handling, http(s) enforcement, password reset links and many more. Since the host header itself is provided by the client it can be forged to any value, even in a name based virtual hosts environment. A blog post describes this problem in great detail.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2014-05-22-1.yaml
- github.com/TYPO3/typo3
- github.com/TYPO3/typo3/commit/32efb1b03573d51391126c90cd87c74b3dc457fb
- github.com/TYPO3/typo3/commit/9bd777649e4022c89dbf39ca41988a594b5e94b8
- github.com/TYPO3/typo3/commit/c39bca9613c311dd12e61771dd311b1bb2283b8d
- github.com/TYPO3/typo3/commit/d554ac5323f3b0fac1fce4c2c491d0123badd669
- github.com/advisories/GHSA-mxjf-hc9v-xgv2
- typo3.org/security/advisory/typo3-core-sa-2014-001
- web.archive.org/web/20140531042943/http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
Detect and mitigate GHSA-mxjf-hc9v-xgv2 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →