Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 4 Aug 2020 09:30:44 +0000 (UTC)
From:      Jochen Neumeister <joneum@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r544152 - head/security/vuxml
Message-ID:  <202008040930.0749UiE1022243@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: joneum
Date: Tue Aug  4 09:30:44 2020
New Revision: 544152
URL: https://svnweb.freebsd.org/changeset/ports/544152

Log:
  add entry for typo3-9 and typo3-10
  
  PR:		248430 248429
  Sponsored by:	Netzkommune GmbH

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Aug  4 09:08:04 2020	(r544151)
+++ head/security/vuxml/vuln.xml	Tue Aug  4 09:30:44 2020	(r544152)
@@ -58,6 +58,56 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="eab964f8-d632-11ea-9172-4c72b94353b5">
+    <topic>typo3 -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>typo3-9-php72</name>
+	<name>typo3-9-php73</name>
+	<name>typo3-9-php74</name>
+	<range><lt>9.5.20</lt></range>
+      </package>
+      <package>
+	<name>typo3-10-php72</name>
+	<name>typo3-10-php73</name>
+	<name>typo3-10-php74</name>
+	<range><lt>10.4.6</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Typo3 Team reports:</p>
+	<blockquote cite="https://typo3.org/article/typo3-1046-and-9520-security-releases-published">;
+	  <p>In case an attacker manages to generate a valid cryptographic message authentication
+	    code (HMAC-SHA1) - either by using a different existing vulnerability or in case the
+	    internal encryptionKey was exposed - it is possible to retrieve arbitrary files of a
+	    TYPO3 installation. This includes the possibility to fetch typo3conf/LocalConfiguration.php
+	    which again contains the encryptionKey as well as credentials of the database management
+	    system being used.
+	    In case a database server is directly accessible either via internet or in a shared hosting
+	    network, this allows to completely retrieve, manipulate or delete database contents.
+	    This includes creating an administration user account - which can be used to trigger remote
+	    code execution by injecting custom extensions.</p>
+	  <p>It has been discovered that an internal verification mechanism can be used to generate
+	    arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic
+	    message authentication code (HMAC-SHA1) and can lead to various attack chains as described
+	    below.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://typo3.org/article/typo3-1046-and-9520-security-releases-published</url>;
+      <url>https://typo3.org/security/advisory/typo3-core-sa-2020-007</url>;
+      <url>https://typo3.org/security/advisory/typo3-core-sa-2020-008</url>;
+      <cvename>CVE-2020-15098</cvename>
+      <cvename>CVE-2020-15099</cvename>
+    </references>
+    <dates>
+      <discovery>2020-07-28</discovery>
+      <entry>2020-08-04</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="3c7ba82a-d3fb-11ea-9aba-0c9d925bbbc0">
     <topic>xorg-server -- Pixel Data Uninitialized Memory Information Disclosure</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202008040930.0749UiE1022243>