Cross-Site Scripting via Rich-Text Content
CVE-2021-32768

6.1MEDIUM

Key Information:

Vendor

Typo3

Status
Vendor
CVE Published:
10 August 2021

What is CVE-2021-32768?

TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions failing to properly parse, sanitize and encode malicious rich-text content, the content rendering process in the website frontend is vulnerable to cross-site scripting. Corresponding rendering instructions via TypoScript functionality HTMLparser does not consider all potentially malicious HTML tag & attribute combinations per default. In default scenarios, a valid backend user account is needed to exploit this vulnerability. In case custom plugins used in the website frontend accept and reflect rich-text content submitted by users, no authentication is required. Update to TYPO3 versions 7.6.53 ELTS, 8.7.42 ELTS, 9.5.29, 10.4.19, 11.3.2 that fix the problem described.

Affected Version(s)

TYPO3.CMS >= 7.0.0, < 7.6.53 < 7.0.0, 7.6.53

TYPO3.CMS >= 8.0.0, < 8.7.42 < 8.0.0, 8.7.42

TYPO3.CMS >= 9.0.0, < 9.5.29 < 9.0.0, 9.5.29

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.