TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions the login screen of the standalone install tool discloses the full path of the transient data directory (e.g. /var/www/html/var/transient/). This applies to composer-based scenarios only - “classic” non-composer installations are not affected. This issue has been addressed in version 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3002 | TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions the login screen of the standalone install tool discloses the full path of the transient data directory (e.g. /var/www/html/var/transient/). This applies to composer-based scenarios only - “classic” non-composer installations are not affected. This issue has been addressed in version 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-p2jh-95jg-2w55 | Information Disclosure in typo3/cms-install tool |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-29T20:34:33.323Z
Reserved: 2023-10-30T19:57:51.676Z
Link: CVE-2023-47126
Updated: 2024-08-02T21:01:22.664Z
Status : Modified
Published: 2023-11-14T20:15:08.037
Modified: 2024-11-21T08:29:49.943
Link: CVE-2023-47126
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA