Headline
GHSA-2fx5-pggv-6jjr: TYPO3 Potential Open Redirect via Parsing Differences
Problem
Applications that use TYPO3\CMS\Core\Http\Uri
to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks.
Solution
Update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.
Credits
Thanks to Sam Mush who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.
References
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-55892
TYPO3 Potential Open Redirect via Parsing Differences
Moderate severity GitHub Reviewed Published Jan 14, 2025 in TYPO3/typo3 • Updated Jan 14, 2025
Package
composer typo3/cms-core (Composer)
Affected versions
>= 9.0.0, <= 9.5.48
>= 10.0.0, <= 10.4.47
>= 11.0.0, <= 11.5.41
>= 12.0.0, <= 12.4.24
>= 13.0.0, <= 13.4.2
Patched versions
9.5.49
10.4.48
11.5.42
12.4.25
13.4.3
Problem
Applications that use TYPO3\CMS\Core\Http\Uri to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks.
Solution
Update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.
Credits
Thanks to Sam Mush who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.
References
- TYPO3-CORE-SA-2025-002
References
- GHSA-2fx5-pggv-6jjr
- TYPO3/typo3@a4abf48
- https://typo3.org/security/advisory/typo3-core-sa-2025-002
Published to the GitHub Advisory Database
Jan 14, 2025
Last updated
Jan 14, 2025