aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFernando ApesteguĂ­a <fernape@FreeBSD.org>2023-11-15 13:22:57 +0000
committerFernando ApesteguĂ­a <fernape@FreeBSD.org>2023-11-15 14:44:30 +0000
commit9f2b97cf900250ac7f00b93fdd9a0904e9ecffaf (patch)
tree617932ad0889be7a3aa5c69b4234eef74113ed4f
parent04ffb9b4d83e537eec561201861d8bda7b6ec827 (diff)
downloadports-9f2b97cf900250ac7f00b93fdd9a0904e9ecffaf.tar.gz
ports-9f2b97cf900250ac7f00b93fdd9a0904e9ecffaf.zip
security/vuxml: Record typo3-1{12} vulnerabilities
PR: 275073 275074
-rw-r--r--security/vuxml/vuln/2023.xml56
1 files changed, 56 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index de081674c39c..7ef303a9cc20 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,59 @@
+ <vuln vid="7cc003cb-83b9-11ee-957d-b42e991fc52e">
+ <topic>typo3 -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>typo3-11</name>
+ <name>typo3-12</name>
+ <range><lt>11.5.33</lt></range>
+ <range><lt>12.4.33</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>security-advisories@github.com reports:</p>
+ <blockquote cite="https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019">
+ <p>Weak Authentication in Session Handling in typo3/cms-core:
+ In typo3 installations there are always
+ at least two different sites. Eg. first.example.org and
+ second.example.com. In affected versions a session cookie
+ generated for the first site can be reused on the second site
+ without requiring additional authentication. This
+ vulnerability has been addressed in versions 8.7.55, 9.5.44,
+ 10.4.41, 11.5.33, and 12.4.8. Users are advised to upgrade.
+ There are no known workarounds for this vulnerability.</p>
+ <p>Information Disclosure in Install Tool in typo3/cms-install:
+ In affected versions the login screen of the standalone
+ install tool discloses the full path of the transient data
+ directory (e.g. /var/www/html/var/transient/). This applies
+ to composer-based scenarios only - classic non-composer
+ installations are not affected. This issue has been addressed
+ in version 12.4.8. Users are advised to upgrade. There are
+ no known workarounds for this vulnerability.
+ </p>
+ <p>By-passing Cross-Site Scripting Protection in HTML Sanitizer:
+ In affected versions DOM processing instructions are not
+ handled correctly. This allows bypassing the cross-site
+ scripting mechanism of typo3/html-sanitizer. This
+ vulnerability has been addressed in versions 1.5.3 and 2.1.4.
+ Users are advised to upgrade. There are no known workarounds
+ for this vulnerability.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2023-47125</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2023-47125</url>
+ <cvename>CVE-2023-47126</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2023-47126</url>
+ <cvename>CVE-2023-47127</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2023-47127</url>
+ </references>
+ <dates>
+ <discovery>2023-11-14</discovery>
+ <entry>2023-11-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="31f45d06-7f0e-11ee-94b4-6cc21735f730">
<topic>postgresql-server -- Memory disclosure in aggregate function calls</topic>
<affects>