TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions the login screen of the standalone install tool discloses the full path of the transient data directory (e.g. /var/www/html/var/transient/). This applies to composer-based scenarios only - “classic” non-composer installations are not affected. This issue has been addressed in version 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/TYPO3/typo3/commit/1a735dac01ec7b337ed0d80c738caa8967dea423 | Patch |
https://github.com/TYPO3/typo3/security/advisories/GHSA-p2jh-95jg-2w55 | Vendor Advisory |
https://typo3.org/security/advisory/typo3-core-sa-2023-005 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-11-14 20:15
Updated : 2023-11-21 03:01
NVD link : CVE-2023-47126
Mitre link : CVE-2023-47126
CVE.ORG link : CVE-2023-47126
JSON object : View
Products Affected
typo3
- typo3
CWE