CVE-2022-36020 – typo3/cms-core
Package
Manager: composer
Name: typo3/cms-core
Vulnerable Version: >=10.0.0 <10.4.32 || >=11.0.0 <11.5.16
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0011 pctl0.30004
Details
TYPO3 HTML Sanitizer Bypasses Cross-Site Scripting Protection > ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7) ### Problem Due to a parsing issue in upstream package [`masterminds/html5`](https://packagist.org/packages/masterminds/html5), malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This allows to by-pass the cross-site scripting mechanism of `typo3/html-sanitizer`. ### Solution Update to `typo3/html-sanitizer` versions 1.0.7 or 2.0.16 that fix the problem described. ### Credits Thanks to David Klein who reported this issue, and to TYPO3 security team member Oliver Hader who fixed the issue.
Metadata
Created: 2022-09-16T18:50:12Z
Modified: 2022-09-16T18:50:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-47m6-46mj-p235/GHSA-47m6-46mj-p235.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-47m6-46mj-p235
Finding: F008
Auto approve: 1