git: 9f2b97cf9002 - main - security/vuxml: Record typo3-1{12} vulnerabilities

From: Fernando Apesteguía <fernape_at_FreeBSD.org>
Date: Wed, 15 Nov 2023 14:45:09 UTC
The branch main has been updated by fernape:

URL: https://cgit.FreeBSD.org/ports/commit/?id=9f2b97cf900250ac7f00b93fdd9a0904e9ecffaf

commit 9f2b97cf900250ac7f00b93fdd9a0904e9ecffaf
Author:     Fernando Apesteguía <fernape@FreeBSD.org>
AuthorDate: 2023-11-15 13:22:57 +0000
Commit:     Fernando Apesteguía <fernape@FreeBSD.org>
CommitDate: 2023-11-15 14:44:30 +0000

    security/vuxml: Record typo3-1{12} vulnerabilities
    
    PR: 275073 275074
---
 security/vuxml/vuln/2023.xml | 56 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 56 insertions(+)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index de081674c39c..7ef303a9cc20 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,59 @@
+  <vuln vid="7cc003cb-83b9-11ee-957d-b42e991fc52e">
+    <topic>typo3 -- Multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>typo3-11</name>
+	<name>typo3-12</name>
+	<range><lt>11.5.33</lt></range>
+	<range><lt>12.4.33</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>security-advisories@github.com reports:</p>
+	<blockquote cite="https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019">
+	<p>Weak Authentication in Session Handling in typo3/cms-core:
+	In typo3 installations there are always
+	at least two different sites.  Eg.  first.example.org and
+	second.example.com.  In affected versions a session cookie
+	generated for the first site can be reused on the second site
+	without requiring additional authentication.  This
+	vulnerability has been addressed in versions 8.7.55, 9.5.44,
+	10.4.41, 11.5.33, and 12.4.8.  Users are advised to upgrade.
+	There are no known workarounds for this vulnerability.</p>
+	<p>Information Disclosure in Install Tool in typo3/cms-install:
+	In affected versions the login screen of the standalone
+	install tool discloses the full path of the transient data
+	directory (e.g.  /var/www/html/var/transient/).  This applies
+	to composer-based scenarios only - classic non-composer
+	installations are not affected.  This issue has been addressed
+	in version 12.4.8.  Users are advised to upgrade.  There are
+	no known workarounds for this vulnerability.
+	</p>
+	<p>By-passing Cross-Site Scripting Protection in HTML Sanitizer:
+	In affected versions DOM processing instructions are not
+	handled correctly.  This allows bypassing the cross-site
+	scripting mechanism of typo3/html-sanitizer.  This
+	vulnerability has been addressed in versions 1.5.3 and 2.1.4.
+	Users are advised to upgrade.  There are no known workarounds
+	for this vulnerability.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2023-47125</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-47125</url>
+      <cvename>CVE-2023-47126</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-47126</url>
+      <cvename>CVE-2023-47127</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-47127</url>
+    </references>
+    <dates>
+      <discovery>2023-11-14</discovery>
+      <entry>2023-11-15</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="31f45d06-7f0e-11ee-94b4-6cc21735f730">
     <topic>postgresql-server -- Memory disclosure in aggregate function calls</topic>
     <affects>