{"id":"CVE-2023-38499","summary":"typo3/cms-core Information Disclosure due to Out-of-scope Site Resolution","details":"TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem.","aliases":["BIT-typo3-2023-38499","GHSA-jq6g-4v5m-wm9r"],"modified":"2026-04-15T04:41:50.271497Z","published":"2023-07-25T20:54:41.648Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/38xxx/CVE-2023-38499.json","cwe_ids":["CWE-200"],"cna_assigner":"GitHub_M","unresolved_ranges":[{"extracted_events":[{"introduced":"9.4.0"},{"fixed":"9.5.42"},{"introduced":"10.0.0"},{"fixed":"10.4.39"}],"source":"AFFECTED_FIELD"}]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/38xxx/CVE-2023-38499.json"},{"type":"ADVISORY","url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-jq6g-4v5m-wm9r"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38499"},{"type":"ADVISORY","url":"https://typo3.org/security/advisory/typo3-core-sa-2023-003"},{"type":"FIX","url":"https://github.com/TYPO3/typo3/commit/702e2debd4b28f9cdb540544565fe6a8627ccb6a"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/TYPO3/typo3","events":[{"introduced":"6a5e2d4097ef0a0e3ea955af93cf83810d6fa234"},{"fixed":"9eaf8f29875a17b5d48f296d83c1f58b24288b7c"},{"introduced":"36096733dea4bd6f6168209609fa879dc25c0138"},{"fixed":"2312505703ced9702bcc07fc7e0280810be78ee2"}],"database_specific":{"extracted_events":[{"introduced":"11.0.0"},{"fixed":"11.5.30"},{"introduced":"12.0.0"},{"fixed":"12.4.4"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"}}],"versions":["v11.0.0","v11.1.0","v11.2.0","v11.3.0","v11.4.0","v11.5.0","v11.5.1","v11.5.10","v11.5.11","v11.5.12","v11.5.13","v11.5.14","v11.5.15","v11.5.16","v11.5.17","v11.5.18","v11.5.19","v11.5.2","v11.5.20","v11.5.21","v11.5.22","v11.5.23","v11.5.24","v11.5.25","v11.5.26","v11.5.27","v11.5.28","v11.5.29","v11.5.3","v11.5.4","v11.5.5","v11.5.6","v11.5.7","v11.5.8","v11.5.9","v12.0.0","v12.1.0","v12.2.0","v12.3.0","v12.4.0","v12.4.1","v12.4.2","v12.4.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-38499.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/typo3/typo3","events":[{"introduced":"0"},{"fixed":"702e2debd4b28f9cdb540544565fe6a8627ccb6a"}],"database_specific":{"source":"REFERENCES"}}],"versions":["6.2.0","6.2.1","6.2.2","6.2.3","7.0.0","7.1.0","7.2.0","7.3.0","7.4.0","7.5.0","7.6.0","7.6.1","7.6.2","8.0.0","8.1.0","8.2.0","8.3.0","8.4.0","8.5.0","8.6.0","8.7.0","TYPO3_6-1-0rc1","TYPO3_6-2-0","TYPO3_6-2-0alpha1","TYPO3_6-2-0alpha2","TYPO3_6-2-0alpha3","TYPO3_6-2-0beta1","TYPO3_6-2-0beta2","TYPO3_6-2-0beta3","TYPO3_6-2-0beta4","TYPO3_6-2-0beta5","TYPO3_6-2-0beta6","TYPO3_6-2-0beta7","TYPO3_6-2-0rc1","TYPO3_6-2-0rc2","TYPO3_6-2-1","TYPO3_6-2-2","TYPO3_6-2-3","TYPO3_7-0-0","TYPO3_7-1-0","TYPO3_7-2-0","TYPO3_7-3-0","TYPO3_7-4-0","TYPO3_7-5-0","TYPO3_7-6-0","TYPO3_7-6-1","TYPO3_7-6-2","TYPO3_8-0-0","TYPO3_8-1-0","TYPO3_8-2-0","TYPO3_8-3-0","TYPO3_8-4-0","TYPO3_8-5-0","TYPO3_8-6-0","TYPO3_8-7-0","v10.0.0","v10.1.0","v10.2.0","v10.3.0","v10.4.0","v10.4.1","v10.4.2","v10.4.3","v11.0.0","v11.1.0","v11.2.0","v11.3.0","v11.4.0","v11.5.0","v11.5.1","v11.5.2","v11.5.3","v12.0.0","v12.1.0","v12.2.0","v12.3.0","v12.4.0","v12.4.1","v12.4.2","v12.4.3","v9.0.0","v9.1.0","v9.2.0","v9.3.0","v9.4.0","v9.5.0","v9.5.1","v9.5.2","v9.5.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-38499.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}