Executive Summary

Informations
Name CVE-2023-47126 First vendor Publication 2023-11-14
Vendor Cve Last vendor Modification 2023-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Overall CVSS Score 5.3
Base Score 5.3 Environmental Score 5.3
impact SubScore 1.4 Temporal Score 5.3
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact Low
Integrity Impact None Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions the login screen of the standalone install tool discloses the full path of the transient data directory (e.g. /var/www/html/var/transient/). This applies to composer-based scenarios only - “classic†non-composer installations are not affected. This issue has been addressed in version 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47126

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 311

Sources (Detail)

https://github.com/TYPO3/typo3/commit/1a735dac01ec7b337ed0d80c738caa8967dea423
https://github.com/TYPO3/typo3/security/advisories/GHSA-p2jh-95jg-2w55
https://typo3.org/security/advisory/typo3-core-sa-2023-005
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2024-02-02 02:49:39
  • Multiple Updates
2024-02-01 12:31:19
  • Multiple Updates
2024-01-04 02:46:02
  • Multiple Updates
2023-11-21 09:27:30
  • Multiple Updates
2023-11-15 05:27:33
  • Multiple Updates
2023-11-15 00:27:27
  • First insertion