Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 14 Dec 2018 11:57:19 +0000 (UTC)
From:      Jochen Neumeister <joneum@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r487425 - head/security/vuxml
Message-ID:  <201812141157.wBEBvJvS010416@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: joneum
Date: Fri Dec 14 11:57:19 2018
New Revision: 487425
URL: https://svnweb.freebsd.org/changeset/ports/487425

Log:
  Add entry for typo3-8 and typo3-9
  
  PR:		233935 233936
  Sponsored by:	Netzkommune GmbH

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Dec 14 11:28:43 2018	(r487424)
+++ head/security/vuxml/vuln.xml	Fri Dec 14 11:57:19 2018	(r487425)
@@ -58,6 +58,68 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="bab29816-ff93-11e8-b05b-00e04c1ea73d">
+    <topic>typo3 -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>typo3-8</name>
+	<range><lt>8.7.21</lt></range>
+      </package>
+      <package>
+	<name>typo3-9</name>
+	<range><lt>9.5.2</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Typo3 core team reports:</p>
+	<blockquote cite="https://typo3.org/article/typo3-952-8721-and-7632-security-releases-published/">;
+	  <p>CKEditor 4.11 fixes an XSS vulnerability in the HTML parser reported by maxarr.
+	    The vulnerability stemmed from the fact that it was possible to execute XSS inside
+	    the CKEditor source area after persuading the victim to: (i) switch CKEditor to
+	    source mode, then (ii) paste a specially crafted HTML code, prepared by the attacker,
+	    into the opened CKEditor source area, and (iii) switch back to WYSIWYG mode.
+	    Although this is an unlikely scenario, we recommend to upgrade to the latest editor version.</p>
+	  <p>Failing to properly encode user input, online media asset rendering
+	    (*.youtube and *.vimeo files) is vulnerable to cross-site scripting. A valid backend user
+	    account or write access on the server system (e.g. SFTP) is needed in order to exploit this
+	    vulnerability.</p>
+	  <p>Failing to properly encode user input, notifications shown in modal windows in the TYPO3
+	    backend are vulnerable to cross-site scripting. A valid backend user account is needed in
+	    order to exploit this vulnerability.</p>
+	  <p>Failing to properly encode user input, login status display is vulnerable to cross-site
+	    scripting in the website frontend. A valid user account is needed in order to exploit this
+	    vulnerability - either a backend user or a frontend user having the possibility to modify
+	    their user profile.
+	    Template patterns that are affected are:
+	    ###FEUSER_[fieldName]### using system extension felogin
+	    <!--###USERNAME###--> for regular frontend rendering (pattern can be defined individually
+	    using TypoScript setting config.USERNAME_substToken)</p>
+	  <p>It has been discovered that cookies created in the Install Tool are not hardened to be
+	    submitted only via HTTP. In combination with other vulnerabilities such as cross-site
+	    scripting it can lead to hijacking an active and valid session in the Install Tool.</p>
+	  <p>The Install Tool exposes the current TYPO3 version number to non-authenticated users.</p>
+	  <p>Online Media Asset Handling (*.youtube and *.vimeo files) in the TYPO3 backend is vulnerable
+	    to denial of service. Putting large files with according file extensions results in high
+	    consumption of system resources. This can lead to exceeding limits of the current PHP process
+	    which results in a dysfunctional backend component. A valid backend user account or write
+	    access on the server system (e.g. SFTP) is needed in order to exploit this vulnerability.</p>
+	  <p>TYPO3’s built-in record registration functionality (aka “basic shopping cart”) using recs
+	    URL parameters is vulnerable to denial of service. Failing to properly ensure that anonymous
+	    user sessions are valid, attackers can use this vulnerability in order to create  an arbitrary
+	    amount of individual session-data records in the database.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://typo3.org/article/typo3-952-8721-and-7632-security-releases-published/</url>;
+    </references>
+    <dates>
+      <discovery>2018-12-11</discovery>
+      <entry>2018-12-14</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="757e6ee8-ff91-11e8-a148-001b217b3468">
     <topic>Gitlab -- Arbitrary File read in GitLab project import with Git LFS</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201812141157.wBEBvJvS010416>