Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. typo3/cms
  4. ›
  5. GHSA-hww5-6x85-mc24

GHSA-hww5-6x85-mc24: Typo3 Arbitrary Code Execution and Cross-Site Scripting in Backend API

June 5, 2024

Backend API configuration using Page TSconfig is vulnerable to arbitrary code execution and cross-site scripting. TSconfig fields of page properties in backend forms can be used to inject malicious sequences. Field tsconfig_includes is vulnerable to directory traversal leading to same scenarios as having direct access to TSconfig settings.

A valid backend user account having access to modify values for fields pages.TSconfig and pages.tsconfig_includes is needed in order to exploit this vulnerability.

References

  • github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2019-06-25-4.yaml
  • github.com/advisories/GHSA-hww5-6x85-mc24
  • typo3.org/security/advisory/typo3-core-sa-2019-019

Code Behaviors & Features

Detect and mitigate GHSA-hww5-6x85-mc24 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 8.0.0 before 8.7.27, all versions starting from 9.0.0 before 9.5.8

Fixed versions

  • 8.7.27
  • 9.5.8

Solution

Upgrade to versions 8.7.27, 9.5.8 or above.

Source file

packagist/typo3/cms/GHSA-hww5-6x85-mc24.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:22 +0000.