CVE-2023-38499
Description
TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem.
CWE
- CWE-200 — CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
Affected
- TYPO3 / typo3 — v=>= 9.4.0, < 9.5.42 [affected]; v=>= 10.0.0, < 10.4.39 [affected]; v=>= 11.0.0, < 11.5.30 [affected]; v=>= 12.0.0, < 12.4.4 [affected]
CVSS
- 3.1 score=3.7 severity=LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
References
- https://github.com/TYPO3/typo3/security/advisories/GHSA-jq6g-4v5m-wm9r x_refsource_CONFIRM
- https://github.com/TYPO3/typo3/commit/702e2debd4b28f9cdb540544565fe6a8627ccb6a x_refsource_MISC
- https://typo3.org/security/advisory/typo3-core-sa-2023-003 x_refsource_MISC
Source
cvelistV5-main/cves/2023/38xxx/CVE-2023-38499.json