From 0b5dd468329a4de8d8dc91ef6054a67b9ee7a957 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Elias=20H=C3=A4u=C3=9Fler?= Date: Wed, 20 May 2026 08:22:49 +0200 Subject: [PATCH] Improve GHSA-3h52-6v6j-6wwv --- .../GHSA-3h52-6v6j-6wwv.json | 69 ++++++++++++++++++- 1 file changed, 66 insertions(+), 3 deletions(-) diff --git a/advisories/unreviewed/2026/05/GHSA-3h52-6v6j-6wwv/GHSA-3h52-6v6j-6wwv.json b/advisories/unreviewed/2026/05/GHSA-3h52-6v6j-6wwv/GHSA-3h52-6v6j-6wwv.json index 1d9094ac257d6..2a5a583171e6c 100644 --- a/advisories/unreviewed/2026/05/GHSA-3h52-6v6j-6wwv/GHSA-3h52-6v6j-6wwv.json +++ b/advisories/unreviewed/2026/05/GHSA-3h52-6v6j-6wwv/GHSA-3h52-6v6j-6wwv.json @@ -1,24 +1,87 @@ { "schema_version": "1.4.0", "id": "GHSA-3h52-6v6j-6wwv", - "modified": "2026-05-19T12:31:39Z", + "modified": "2026-05-19T12:31:40Z", "published": "2026-05-19T12:31:39Z", "aliases": [ "CVE-2026-8827" ], + "summary": "TYPO3 extension \"tt_address\" affected by SQL Injection", "details": "The AddressRepository::getSqlQuery() method constructs a database query without properly sanitizing user input, leading to SQL Injection. The method is not invoked anywhere within the extension itself and therefore poses no direct risk in a default installation. However, custom extensions that call this method with untrusted input would expose the site to SQL injection.", "severity": [ { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "friendsoftypo3/tt-address" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "10.0.0" + }, + { + "fixed": "10.0.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Packagist", + "name": "friendsoftypo3/tt-address" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "9.0.0" + }, + { + "fixed": "9.1.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Packagist", + "name": "friendsoftypo3/tt-address" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "8.1.2" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-8827" }, + { + "type": "PACKAGE", + "url": "https://github.com/FriendsOfTYPO3/tt_address" + }, { "type": "WEB", "url": "https://typo3.org/security/advisory/typo3-ext-sa-2026-012"