TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions the login screen of the standalone install tool discloses the full path of the transient data directory (e.g. /var/www/html/var/transient/). This applies to composer-based scenarios only - “classic” non-composer installations are not affected. This issue has been addressed in version 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/TYPO3/typo3/commit/1a735dac01ec7b337ed0d80c738caa8967dea423 | Patch |
https://github.com/TYPO3/typo3/security/advisories/GHSA-p2jh-95jg-2w55 | Vendor Advisory |
https://typo3.org/security/advisory/typo3-core-sa-2023-005 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-11-14T20:01:16.570Z
Updated: 2023-11-14T20:01:16.570Z
Reserved: 2023-10-30T19:57:51.676Z
Link: CVE-2023-47126
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-11-14T20:15:08.037
Modified: 2023-11-21T03:01:46.133
Link: CVE-2023-47126
JSON object: View
Redhat Information
No data.