CVE-2020-26229

Published: Nov 23, 2020 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2020-1468 Aliases: GHSA-q9cp-mc96-m4w2
ExploitDB:
Other exploit source:
Google Dorks:
LOW 3,7
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: low
LOW 3,6
Access Vector: network
Access Complexity: high
Authentication: single
Confidentiality: partial
Integrity: none
Availability: partial

Description

AI Translation Available

TYPO3 is an open source PHP based web content management system. In TYPO3 from version 10.4.0, and before version 10.4.10, RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability with current PHP versions of supported and maintained system distributions. At least with libxml2 version 2.9, the processing of XML external entities is disabled per default - and cannot be exploited. Besides that, a valid backend user account is needed. Update to TYPO3 version 10.4.10 to fix the problem described.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0027
Percentile
0,5th
Updated

EPSS Score Trend (Last 90 Days)

611

Improper Restriction of XML External Entity Reference

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability
Potential Impacts:
Read Application Data Read Files Or Directories Bypass Protection Mechanism Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory)
Applicable Platforms
Languages: Not Language-Specific, XML
Technologies: Not Technology-Specific, Web Based
View CWE Details
Application

Typo3 by Typo3

Version Range Affected
From 10.0.0 (inclusive)
To 10.4.10 (exclusive)
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-q9cp-mc96-m4w2
https://typo3.org/security/advisory/typo3-core-sa-2020-012
https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-q9cp-mc96-m4w2
https://typo3.org/security/advisory/typo3-core-sa-2020-012