Vulnerability DatabaseGHSA-p84g-j2gh-83g3

GHSA-p84g-j2gh-83g3
PHP vulnerability analysis and mitigation

Overview

A cache poisoning vulnerability was discovered in TYPO3 CMS affecting versions 6.2.0 to 6.2.8 and 7.0.0 to 7.0.1. The vulnerability was disclosed on December 10, 2014, and tracked as GHSA-p84g-j2gh-83g3. The issue affects the homepage of TYPO3 installations when using specific configuration options related to anchor handling (TYPO3 Advisory, GitHub Advisory).

Technical details

The vulnerability occurs when the configuration option config.prefixLocalAnchors is set to either 'all' or 'cached'. This setting allows request URLs with arbitrary arguments pointing to the homepage to be cached. The issue specifically affects installations where the homepage is not configured as a shortcut to a different page (TYPO3 Advisory).

Impact

The primary impact of this vulnerability is that unfamiliar-looking links to the home page can be cached, causing the page to reload in the browser when section links are followed by web page visitors, instead of directly jumping to the requested section of the page. This behavior affects the user experience and can potentially be exploited for link spoofing (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in TYPO3 versions 6.2.9 and 7.0.2. As a workaround, administrators can either set config.absRefPrefix to a value fitting their installation or remove the configuration options config.prefixLocalAnchors and config.baseUrl in favor of config.absRefPrefix (TYPO3 Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management