Arbitrary Code Execution Affecting typo3/cms package, versions >=8.0.0, <8.7.27 >=9.0.0, <9.5.8
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-TYPO3CMS-450931
- published 25 Jun 2019
- disclosed 25 Jun 2019
- credit Benjamin Kott, Oliver Hader
How to fix?
Upgrade typo3/cms
to version 8.7.27, 9.5.8 or higher.
Overview
typo3/cms is a free open source Content Management Framework.
Affected versions of this package are vulnerable to Arbitrary Code Execution. Exploited by the backend API configuration, using TSconfig
fields of the page properties in backend forms, can be used to inject malicious sequences. Field tsconfig_includes
is vulnerable to directory traversal leading to it allowing direct access to TSconfig
settings as a backend user which has permissions to modify values for fields pages.