Zum Hauptinhalt springen

neue Wege und Ideen

tp3

was ist tp3

Software Entwicklung & Support

Ein breites Spektrum an Erfahrungen und Techniken bieten die Grundlage für meine Leistungen. Ob System Upgrades z.B. typo3 4.5 auf 6.2 oder 8.7, API Deisgn für Integrierte Anwendungen auch in SAPUI5. 

 

Einführung des "continuous integration process" bei tp3 verspricht höcher Qualität bei flexiblerer Leistung!

 

Bei Fragen eine email @ thomasruta.de


News System

 

 

 

  • Release Date: June 14, 2022
  • Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
  • Component: "AMEOS - TarteAuCitron (GDPR cookie banner and tracking management / French RGPD compatible)" (ameos_tarteaucitron)
  • Vulnerability Type: Cross-Site Scripting
  • Affected Versions: 1.2.22 and below
  • Severity: Medium
  • Suggested CVSS: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C
  • References: CVE-2022-33155

Problem Description

The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.

Solution

An updated version 1.2.23 is available from the TYPO3 extension manager, packagist and at  

https://extensions.typo3.org/extension/download/ameos_tarteaucitron/1.2.23/zip

Users of the extension are advised to update the extension as soon as possible.

Credits

Thanks to TYPO3 Security Team member Torben Hansen for reporting the vulnerability and to Luc Muller for providing an updated version of the extension.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.