Skip to content

Commit

Permalink
generated content from 2025-01-14
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Jan 14, 2025
1 parent f9e60c9 commit 1167161
Show file tree
Hide file tree
Showing 3 changed files with 46 additions and 0 deletions.
2 changes: 2 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -263610,3 +263610,5 @@ vulnerability,CVE-2025-21133,vulnerability--72a769ca-2dec-44d3-b455-564917c23e11
vulnerability,CVE-2025-21136,vulnerability--63d4f543-ad0b-4b7d-be34-c0980a8a2423
vulnerability,CVE-2025-23019,vulnerability--09f99617-8187-47f8-8f8c-e48eaa8a0e94
vulnerability,CVE-2025-23018,vulnerability--d06f8869-9e06-44d4-9877-604ef0d3a077
vulnerability,CVE-2024-55893,vulnerability--23119288-24a8-4e61-b394-a577051e6e1a
vulnerability,CVE-2024-55892,vulnerability--dc797d53-83b4-4545-a2cb-24a219667034
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e59caa16-1a26-4860-aca5-1939478f97d9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23119288-24a8-4e61-b394-a577051e6e1a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T21:18:23.359065Z",
"modified": "2025-01-14T21:18:23.359065Z",
"name": "CVE-2024-55893",
"description": "TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component “Log Module” allows attackers to remove log entries. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-55893"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7ca17400-9ef1-4f70-b4d8-d62f4ea3e499",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--dc797d53-83b4-4545-a2cb-24a219667034",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T21:18:23.392043Z",
"modified": "2025-01-14T21:18:23.392043Z",
"name": "CVE-2024-55892",
"description": "TYPO3 is a free and open source Content Management Framework. Applications that use `TYPO3\\CMS\\Core\\Http\\Uri` to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks. Users are advised to update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 LTS, 12.4.25 LTS, 13.4.3 which fix the problem described. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-55892"
}
]
}
]
}

0 comments on commit 1167161

Please sign in to comment.