Skip to content
GitLab
  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
  • Sign in
  • typo3 typo3
  • Project information
    • Project information
    • Activity
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Locked Files
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Packages & Registries
    • Packages & Registries
    • Container Registry
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Insights
    • Issue
    • Repository
  • Activity
  • Graph
  • Jobs
  • Commits
Collapse sidebar
  • typo3
  • typo3typo3
  • Repository
Switch branch/tag
  • typo3
  • ..
  • Templates
  • PasswordRecovery.html
Find file BlameHistoryPermalink
  • Andreas Fernandez's avatar
    [SECURITY] Avoid HTML injection in password recovery mail · da611775
    Andreas Fernandez authored Jun 14, 2022 and Oliver Hader's avatar Oliver Hader committed Jun 14, 2022
    The `receiverName` variable used in the password recovery mail of the
    Extbase felogin plugin was susceptible to HTML injection due to
    missing sanitization. The variable is now passed thru the
    `f:format.htmlspecialchars` ViewHelper.
    
    Resolves: #96559
    Releases: main, 11.5, 10.4
    Change-Id: I60e23c161f7f2fcc87b8870345b10a4c31d7b8db
    Security-Bulletin: TYPO3-CORE-SA-2022-004
    Security-References: CVE-2022-31049
    Reviewed-on: https://review.typo3.org/c/Packages/TYPO3.CMS/+/74904
    
    Tested-by: Oliver Hader's avatarOliver Hader <oliver.hader@typo3.org>
    Reviewed-by: Oliver Hader's avatarOliver Hader <oliver.hader@typo3.org>
    da611775