Arbitrary Code Execution

Affecting typo3/cms package, versions >=8.0.0, <8.7.23 || >=9.0.0, <9.5.4

Do your applications use this vulnerable package? Test your applications

Overview

typo3/cms is a free open source Content Management Framework.

Affected versions of this package are vulnerable to Arbitrary Code Execution. Due to missing file extensions in $GLOBALS['TYPO3_CONF_VARS']['BE'][‘fileDenyPattern’], backend users are allowed to upload *.phar, *.shtml, *.pl or *.cgi files which can be executed in certain web server setups.

Remediation

Upgrade typo3/cms to version 8.7.23, 9.5.4 or higher.

References

CVSS Score

9.9
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    Low
  • User Interaction
    None
  • Scope
    Changed
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
Credit
Edgar Boda-Majer and Lauritz Holtmann
CWE
CWE-79
Snyk ID
SNYK-PHP-TYPO3CMS-73590
Disclosed
22 Jan, 2019
Published
22 Jan, 2019