From 1167161917d045cae27911f7ab6e3650c3ee7f88 Mon Sep 17 00:00:00 2001 From: gitadvisor Date: Tue, 14 Jan 2025 21:18:44 +0000 Subject: [PATCH] generated content from 2025-01-14 --- mapping.csv | 2 ++ ...-23119288-24a8-4e61-b394-a577051e6e1a.json | 22 +++++++++++++++++++ ...-dc797d53-83b4-4545-a2cb-24a219667034.json | 22 +++++++++++++++++++ 3 files changed, 46 insertions(+) create mode 100644 objects/vulnerability/vulnerability--23119288-24a8-4e61-b394-a577051e6e1a.json create mode 100644 objects/vulnerability/vulnerability--dc797d53-83b4-4545-a2cb-24a219667034.json diff --git a/mapping.csv b/mapping.csv index b4599d6bad..8ca6361a02 100644 --- a/mapping.csv +++ b/mapping.csv @@ -263610,3 +263610,5 @@ vulnerability,CVE-2025-21133,vulnerability--72a769ca-2dec-44d3-b455-564917c23e11 vulnerability,CVE-2025-21136,vulnerability--63d4f543-ad0b-4b7d-be34-c0980a8a2423 vulnerability,CVE-2025-23019,vulnerability--09f99617-8187-47f8-8f8c-e48eaa8a0e94 vulnerability,CVE-2025-23018,vulnerability--d06f8869-9e06-44d4-9877-604ef0d3a077 +vulnerability,CVE-2024-55893,vulnerability--23119288-24a8-4e61-b394-a577051e6e1a +vulnerability,CVE-2024-55892,vulnerability--dc797d53-83b4-4545-a2cb-24a219667034 diff --git a/objects/vulnerability/vulnerability--23119288-24a8-4e61-b394-a577051e6e1a.json b/objects/vulnerability/vulnerability--23119288-24a8-4e61-b394-a577051e6e1a.json new file mode 100644 index 0000000000..c139f0be87 --- /dev/null +++ b/objects/vulnerability/vulnerability--23119288-24a8-4e61-b394-a577051e6e1a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e59caa16-1a26-4860-aca5-1939478f97d9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--23119288-24a8-4e61-b394-a577051e6e1a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T21:18:23.359065Z", + "modified": "2025-01-14T21:18:23.359065Z", + "name": "CVE-2024-55893", + "description": "TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component “Log Module” allows attackers to remove log entries. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-55893" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dc797d53-83b4-4545-a2cb-24a219667034.json b/objects/vulnerability/vulnerability--dc797d53-83b4-4545-a2cb-24a219667034.json new file mode 100644 index 0000000000..ca36371c20 --- /dev/null +++ b/objects/vulnerability/vulnerability--dc797d53-83b4-4545-a2cb-24a219667034.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7ca17400-9ef1-4f70-b4d8-d62f4ea3e499", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dc797d53-83b4-4545-a2cb-24a219667034", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T21:18:23.392043Z", + "modified": "2025-01-14T21:18:23.392043Z", + "name": "CVE-2024-55892", + "description": "TYPO3 is a free and open source Content Management Framework. Applications that use `TYPO3\\CMS\\Core\\Http\\Uri` to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks. Users are advised to update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 LTS, 12.4.25 LTS, 13.4.3 which fix the problem described. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-55892" + } + ] + } + ] +} \ No newline at end of file