TYPO3-CORE-SA-2016-020: Cross-Site Scripting in third party library mso/idna-convert

Categories: TYPO3 CMS Created by Helmut Hummel
It has been discovered, that TYPO3 ships example code of mso/idna-convert library that is vulnerable to Cross-Site Scripting

Component Type: TYPO3 CMS

Release Date: July 19, 2016

Vulnerability Type: Cross-Site Scripting

Affected Versions: 7.6.0 to 7.6.9 and 8.0.0 to 8.2.0

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:O/RC:C

CVE: not assigned yet

Problem Description: TYPO3 ships example code from mso/idna-convert library in the vendor folder, which is vulnerable to Cross-Site Scripting.

Solution: Update to TYPO3 versions 7.6.10 or 8.2.1 that fix the problem described.

Alternative Solution: Make sure to not expose the vendor directory to the publicly accessible document root. In composer managed installation, make sure to configure a dedicated web folder. In general it is recommended to not expose the complete typo3_src sources folder in the document root.

Credits: Thanks to Frank Huber who discovered and reported the issue.

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.