cve/2023/CVE-2023-38499.md

21 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-38499](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38499)
![](https://img.shields.io/static/v1?label=Product&message=typo3&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%209.4.0%2C%20%3C%209.5.42%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/miguelc49/CVE-2023-38499-1
- https://github.com/miguelc49/CVE-2023-38499-2
- https://github.com/miguelc49/CVE-2023-38499-3
- https://github.com/nomi-sec/PoC-in-GitHub