From 411d5c1f460c87a4d44f6aa0da43ea3a646d9879 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Elias=20H=C3=A4u=C3=9Fler?= Date: Wed, 20 May 2026 08:29:03 +0200 Subject: [PATCH] Improve GHSA-g868-j3qm-4j28 --- .../GHSA-g868-j3qm-4j28.json | 88 ++++++++++++++++++- 1 file changed, 85 insertions(+), 3 deletions(-) diff --git a/advisories/unreviewed/2026/05/GHSA-g868-j3qm-4j28/GHSA-g868-j3qm-4j28.json b/advisories/unreviewed/2026/05/GHSA-g868-j3qm-4j28/GHSA-g868-j3qm-4j28.json index 21e26037df976..8d1f8bdfc527f 100644 --- a/advisories/unreviewed/2026/05/GHSA-g868-j3qm-4j28/GHSA-g868-j3qm-4j28.json +++ b/advisories/unreviewed/2026/05/GHSA-g868-j3qm-4j28/GHSA-g868-j3qm-4j28.json @@ -1,24 +1,106 @@ { "schema_version": "1.4.0", "id": "GHSA-g868-j3qm-4j28", - "modified": "2026-05-19T12:31:39Z", + "modified": "2026-05-19T12:31:40Z", "published": "2026-05-19T12:31:39Z", "aliases": [ "CVE-2026-8726" ], + "summary": "TYPO3 extension \"news\" affected by SQL Injection", "details": "The extension fails to properly sanitize user input before using it in a database query. As a result, an unauthenticated attacker can inject arbitrary SQL through a URL parameter on pages using the \"Date Menu of news articles\" plugin. Exploitation requires the \"Date Menu of news articles\" plugin to be in use and the TypoScript/Plugin setting disableOverrideDemand not to be enabled.", "severity": [ { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "georgringer/news" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "14.0.0" + }, + { + "fixed": "14.0.3" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Packagist", + "name": "georgringer/news" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "13.0.0" + }, + { + "fixed": "13.0.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Packagist", + "name": "georgringer/news" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "12.0.0" + }, + { + "fixed": "12.3.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Packagist", + "name": "georgringer/news" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "11.4.4" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-8726" }, + { + "type": "PACKAGE", + "url": "https://github.com/georgringer/news" + }, { "type": "WEB", "url": "https://typo3.org/security/advisory/typo3-ext-sa-2026-010"