Vigil@nce - TYPO3 Recommend Page: Cross Site Scripting via the request parameter tx_pbrecommendpage_pi1
March 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Scripting via
tx_pbrecommendpage_pi1 of TYPO3 Recommend Page, in order to run
JavaScript code in the context of the web site.
– Impacted products: TYPO3 Extensions not comprehensive.
– Severity: 2/4.
– Creation date: 18/01/2017.
DESCRIPTION OF THE VULNERABILITY
The Recommend Page extension can be installed on TYPO3.
However, it does not filter received data via the request
parameter tx_pbrecommendpage_pi1 before inserting them in
generated HTML documents.
An attacker, inside a guest system, can therefore trigger a Cross
Site Scripting via tx_pbrecommendpage_pi1 of TYPO3 Recommend Page,
in order to run JavaScript code in the context of the web site.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN