Arbitrary Code Execution Affecting typo3/cms package, versions >=8.0.0, <8.7.27 >=9.0.0, <9.5.8


0.0
high

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-TYPO3CMS-450931
  • published 25 Jun 2019
  • disclosed 25 Jun 2019
  • credit Benjamin Kott, Oliver Hader

Introduced: 25 Jun 2019

CVE NOT AVAILABLE CWE-94 Open this link in a new tab

How to fix?

Upgrade typo3/cms to version 8.7.27, 9.5.8 or higher.

Overview

typo3/cms is a free open source Content Management Framework.

Affected versions of this package are vulnerable to Arbitrary Code Execution. Exploited by the backend API configuration, using TSconfig fields of the page properties in backend forms, can be used to inject malicious sequences. Field tsconfig_includes is vulnerable to directory traversal leading to it allowing direct access to TSconfig settings as a backend user which has permissions to modify values for fields pages.