Vulnerability Description
TYPO3 is an open source PHP based web content management system. In versions prior to 9.5.38, 10.4.33, 11.5.20, and 12.1.1, requesting invalid or non-existing resources via HTTP triggers the page error handler, which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded. This vulnerability is very similar, but not identical, to the one described in CVE-2021-21359. This issue is patched in versions 9.5.38 ELTS, 10.4.33, 11.5.20 or 12.1.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typo3 | Typo3 | >= 9.0.0, < 9.5.38 |
Related Weaknesses (CWE)
References
- https://github.com/TYPO3/typo3/security/advisories/GHSA-8c28-5mp7-v24hThird Party Advisory
- https://github.com/TYPO3/typo3/security/advisories/GHSA-8c28-5mp7-v24hThird Party Advisory
FAQ
What is CVE-2022-23500?
CVE-2022-23500 is a vulnerability with a CVSS score of 5.9 (MEDIUM). TYPO3 is an open source PHP based web content management system. In versions prior to 9.5.38, 10.4.33, 11.5.20, and 12.1.1, requesting invalid or non-existing resources via HTTP triggers the page erro...
How severe is CVE-2022-23500?
CVE-2022-23500 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23500?
Check the references section above for vendor advisories and patch information. Affected products include: Typo3 Typo3.