Deserialization of Untrusted Data Affecting typo3/cms-core package, versions >=10.0.0, <10.4.2 >=9.0.0, <9.5.17


0.0
high

Snyk CVSS

    Attack Complexity High
    Scope Changed
    Integrity High
    Availability High

    Threat Intelligence

    Exploit Maturity Mature
    EPSS 0.11% (44th percentile)
Expand this section
NVD
10 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-TYPO3CMSCORE-568940
  • published 12 May 2020
  • disclosed 12 May 2020
  • credit Oliver Hader

How to fix?

Upgrade typo3/cms-core to version 10.4.2, 9.5.17 or higher.

Overview

typo3/cms-core is a free open source enterprise content management system.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. Calling unserialize() on malicious user-submitted content can result in the following scenarios:

  • trigger deletion of arbitrary directory in file system (if writable for web server)
  • trigger message submission via email using identity of web site (mail relay)

Another insecure deserialization vulnerability is required to actually exploit mentioned aspects.