TYPO3 Potential Open Redirect via Parsing Differences
Package
Affected versions
>= 9.0.0, <= 9.5.48
>= 10.0.0, <= 10.4.47
>= 11.0.0, <= 11.5.41
>= 12.0.0, <= 12.4.24
>= 13.0.0, <= 13.4.2
Patched versions
9.5.49
10.4.48
11.5.42
12.4.25
13.4.3
Description
Published to the GitHub Advisory Database
Jan 14, 2025
Reviewed
Jan 14, 2025
Published by the National Vulnerability Database
Jan 14, 2025
Last updated
Jan 15, 2025
Problem
Applications that use
TYPO3\CMS\Core\Http\Uri
to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks.Solution
Update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.
Credits
Thanks to Sam Mush and Christian Eßl who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.
References
References