CVE Vulnerabilities

CVE-2022-23504

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

Published: Dec 14, 2022 | Modified: Dec 16, 2022
CVSS 3.x
4.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

TYPO3 is an open source PHP based web content management system. Versions prior to 9.5.38, 10.4.33, 11.5.20, and 12.1.1 are subject to Sensitive Information Disclosure. Due to the lack of handling user-submitted YAML placeholder expressions in the site configuration backend module, attackers could expose sensitive internal information, such as system configuration or HTTP request messages of other website visitors. A valid backend user account having administrator privileges is needed to exploit this vulnerability. This issue has been patched in versions 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1.

Weakness

The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.

Affected Software

Name Vendor Start Version End Version
Typo3 Typo3 9.0.0 (including) 9.5.38 (excluding)
Typo3 Typo3 10.0.0 (including) 10.4.33 (excluding)
Typo3 Typo3 11.0.0 (including) 11.5.20 (excluding)
Typo3 Typo3 12.0.0 (including) 12.1.1 (excluding)

Potential Mitigations

  • If user-controlled data must be added to an expression interpreter, one or more of the following should be performed:

References