Arbitrary Code Execution Affecting typo3/cms-core package, versions >=8.0.0, <8.7.27 >=9.0.0, <9.5.8


0.0
high

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-TYPO3CMSCORE-450930
  • published 25 Jun 2019
  • disclosed 25 Jun 2019
  • credit Benjamin Kott, Oliver Hader

Introduced: 25 Jun 2019

CVE NOT AVAILABLE CWE-94 Open this link in a new tab

How to fix?

Upgrade typo3/cms-core to version 8.7.27, 9.5.8 or higher.

Overview

typo3/cms-core is a free open source enterprise content management system.

Affected versions of this package are vulnerable to Arbitrary Code Execution. Exploited by the backend API configuration, using TSconfig fields of the page properties in backend forms, can be used to inject malicious sequences. Field tsconfig_includes is vulnerable to directory traversal leading to it allowing direct access to TSconfig settings as a backend user which has permissions to modify values for fields pages.