Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. typo3/cms
  4. ›
  5. TYPO3-CORE-SA-2016-022

TYPO3-CORE-SA-2016-022: Cache Flooding in Frontend

September 13, 2016

Links with a valid cHash argument lead to newly generated page cache entries. Because the cHash is not bound to a specific page, attackers could use valid cHash arguments for multiple pages, leading to additional useless page cache entries. Depending on the number of pages in the system and the number of available valid links with a cHash, attackers could add a considerable amount of additional cache entries, which in the end exceed storage limits and thus could lead to the system not responding any more. This means the Cache Flooding attack potentially could lead to a successful Denial of Service (DoS) attack.

References

  • typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-022

Code Behaviors & Features

Detect and mitigate TYPO3-CORE-SA-2016-022 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.2.27, all versions starting from 7.0.0.alpha before 7.6.11, all versions starting from 8.0.0.alpha before 8.3.1

Fixed versions

  • 6.2.27
  • 7.6.11
  • 8.3.1

Solution

Upgrade to versions 6.2.27, 7.6.11, 8.3.1 or above.

Source file

packagist/typo3/cms/TYPO3-CORE-SA-2016-022.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:13 +0000.