TYPO3 HTML Sanitizer is an HTML sanitizer, written in PHP, aiming to provide cross-site-scripting-safe markup based on explicitly allowed tags, attributes and values. Starting in version 1.0.0 and prior to versions 1.5.1 and 2.1.2, due to an encoding issue in the serialization layer, malicious markup nested in a `noscript` element was not encoded correctly. `noscript` is disabled in the default configuration, but might have been enabled in custom scenarios. This allows bypassing the cross-site scripting mechanism of TYPO3 HTML Sanitizer. Versions 1.5.1 and 2.1.2 fix the problem..This CVE has a CVSS3.1 score of 4.7 and a Base Severity of MEDIUM.
Info | Details |
---|---|
CVE ID | CVE-2023-38500 |
CVE State | PUBLISHED |
BaseScore | 4.7 |
BaseSeverity | MEDIUM |
VectorString | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N |
Version | NA |
References for CVE-2023-38500 :
https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-59jf-3q9v-rh6g
https://github.com/TYPO3/html-sanitizer/commit/e3026f589fef0be8c3574ee3f0a0bfbe33d7ebdb
https://typo3.org/security/advisory/typo3-core-sa-2023-002
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NETWORK |
AttackComplexity(AC) | HIGH |
PrivilegesRequired(PR) | NONE |
UserInteraction(UI) | REQUIRED |
Scope(S) | CHANGED |
Confidentiality(C) | LOW |
Availability(A) | NONE |
Integrity(I) | LOW |