Miggo Logo

CVE-2022-36107:
TYPO3 CMS Stored Cross-Site Scripting via FileDumpController

5.4

CVSS Score

Basic Information

EPSS Score
-
Published
9/16/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
typo3/cms-corecomposer>= 7.0.0, < 7.6.587.6.58
typo3/cms-corecomposer>= 8.0.0, < 8.7.488.7.48
typo3/cms-corecomposer>= 9.0.0, < 9.5.379.5.37
typo3/cms-corecomposer>= 10.0.0, < 10.4.3210.4.32
typo3/cms-corecomposer>= 11.0.0, < 11.5.1611.5.16
typo3/cmscomposer>= 10.0.0, < 10.4.3210.4.32
typo3/cmscomposer>= 11.0.0, < 11.5.1611.5.16

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from FileDumpController serving files without adequate XSS protections. The commit diff shows critical CSP-related modifications:- Return statements were modified to wrap responses with applyContentSecurityPolicy- A new CSP enforcement method was added- Without these changes, malicious files could trigger XSS via script execution in browser contexts. The dumpAction method is the primary entry point for file serving and was missing CSP headers before the patch.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

> ### M*t* > * *VSS: `*VSS:*.*/*V:N/**:L/PR:L/UI:R/S:*/*:L/I:L/*:N/*:*/RL:O/R*:*` (*.*) ### Pro*l*m It **s ***n *is*ov*r** t**t t** `*il**ump*ontroll*r` (***k*n* *n* *ront*n* *ont*xt) is vuln*r**l* to *ross-sit* s*riptin* w**n m*li*ious *il*s *r* *i

Reasoning

T** vuln*r**ility st*mm** *rom *il**ump*ontroll*r s*rvin* *il*s wit*out ***qu*t* XSS prot**tions. T** *ommit *i** s*ows *riti**l *SP-r*l*t** mo*i*i**tions:- R*turn st*t*m*nts w*r* mo*i*i** to wr*p r*spons*s wit* *pply*ont*ntS**urityPoli*y- * n*w *SP