CVE-2020-26216

Published: Nov 17, 2020 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2020-1457 Aliases: GHSA-hpjm-3ww5-6cpf
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,0
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: required
Scope: changed
Confidentiality: high
Integrity: high
Availability: none
MEDIUM 4,3
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: none
Integrity: partial
Availability: none

Description

AI Translation Available

TYPO3 Fluid before versions 2.0.8, 2.1.7, 2.2.4, 2.3.7, 2.4.4, 2.5.11 and 2.6.10 is vulnerable to Cross-Site Scripting. Three XSS vulnerabilities have been detected in Fluid: 1. TagBasedViewHelper allowed XSS through maliciously crafted additionalAttributes arrays by creating keys with attribute-closing quotes followed by HTML. When rendering such attributes, TagBuilder would not escape the keys. 2. ViewHelpers which used the CompileWithContentArgumentAndRenderStatic trait, and which declared escapeOutput = false, would receive the content argument in unescaped format. 3. Subclasses of AbstractConditionViewHelper would receive the then and else arguments in unescaped format. Update to versions 2.0.8, 2.1.7, 2.2.4, 2.3.7, 2.4.4, 2.5.11 or 2.6.10 of this typo3fluid/fluid package that fix the problem described. More details are available in the linked advisory.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0058
Percentile
0,7th
Updated

EPSS Score Trend (Last 90 Days)

79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Stable
Common Consequences
Security Scopes Affected:
Access Control Confidentiality Integrity Availability
Potential Impacts:
Bypass Protection Mechanism Read Application Data Execute Unauthorized Code Or Commands
Applicable Platforms
Technologies: AI/ML, Web Based, Web Server
View CWE Details
Application

Fluid by Typo3

Version Range Affected
From 2.3.0 (inclusive)
To 2.3.7 (exclusive)
cpe:2.3:a:typo3:fluid:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Fluid by Typo3

Version Range Affected
To 2.0.8 (exclusive)
cpe:2.3:a:typo3:fluid:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Fluid by Typo3

Version Range Affected
From 2.1.0 (inclusive)
To 2.1.7 (exclusive)
cpe:2.3:a:typo3:fluid:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Fluid by Typo3

Version Range Affected
From 2.2.0 (inclusive)
To 2.2.4 (exclusive)
cpe:2.3:a:typo3:fluid:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Fluid by Typo3

Version Range Affected
From 2.4.0 (inclusive)
To 2.4.4 (exclusive)
cpe:2.3:a:typo3:fluid:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Fluid by Typo3

Version Range Affected
From 2.6.0 (inclusive)
To 2.6.10 (exclusive)
cpe:2.3:a:typo3:fluid:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Fluid by Typo3

Version Range Affected
From 2.5.0 (inclusive)
To 2.5.11 (exclusive)
cpe:2.3:a:typo3:fluid:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/TYPO3/Fluid/commit/f20db4e74cf9803c6cffca2ed2f03e1b0b89d0dc
https://github.com/TYPO3/Fluid/security/advisories/GHSA-hpjm-3ww5-6cpf
https://typo3.org/security/advisory/typo3-core-sa-2020-009
https://github.com/TYPO3/Fluid/commit/f20db4e74cf9803c6cffca2ed2f03e1b0b89d0dc
https://github.com/TYPO3/Fluid/security/advisories/GHSA-hpjm-3ww5-6cpf
https://typo3.org/security/advisory/typo3-core-sa-2020-009