Deserialization of Untrusted Data Affecting typo3/cms-core package, versions >=10.0.0, <10.4.2>=9.0.0, <9.5.17


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
0.11% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Deserialization of Untrusted Data vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-TYPO3CMSCORE-568940
  • published12 May 2020
  • disclosed12 May 2020
  • creditOliver Hader

Introduced: 12 May 2020

CVE-2020-11066  (opens in a new tab)
CWE-502  (opens in a new tab)

How to fix?

Upgrade typo3/cms-core to version 10.4.2, 9.5.17 or higher.

Overview

typo3/cms-core is a free open source enterprise content management system.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. Calling unserialize() on malicious user-submitted content can result in the following scenarios:

  • trigger deletion of arbitrary directory in file system (if writable for web server)
  • trigger message submission via email using identity of web site (mail relay)

Another insecure deserialization vulnerability is required to actually exploit mentioned aspects.

CVSS Scores

version 3.1