Arbitrary Code Execution Affecting typo3/cms-core package, versions >=8.0.0, <8.7.27>=9.0.0, <9.5.8


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-TYPO3CMSCORE-450930
  • published25 Jun 2019
  • disclosed25 Jun 2019
  • creditBenjamin Kott, Oliver Hader

Introduced: 25 Jun 2019

CVE NOT AVAILABLE CWE-94  (opens in a new tab)

How to fix?

Upgrade typo3/cms-core to version 8.7.27, 9.5.8 or higher.

Overview

typo3/cms-core is a free open source enterprise content management system.

Affected versions of this package are vulnerable to Arbitrary Code Execution. Exploited by the backend API configuration, using TSconfig fields of the page properties in backend forms, can be used to inject malicious sequences. Field tsconfig_includes is vulnerable to directory traversal leading to it allowing direct access to TSconfig settings as a backend user which has permissions to modify values for fields pages.

CVSS Scores

version 3.1