BIT-typo3-2020-11067

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/typo3/BIT-typo3-2020-11067.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-typo3-2020-11067
Aliases
Published
2024-03-06T11:11:55.868Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

In TYPO3 CMS 9.0.0 through 9.5.16 and 10.0.0 through 10.4.1, it has been discovered that backend user settings (in $BE_USER->uc) are vulnerable to insecure deserialization. In combination with vulnerabilities of third party components, this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability. This has been fixed in 9.5.17 and 10.4.2.

Database specific
{
    "cpes": [
        "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / typo3

Package

Name
typo3
Purl
pkg:bitnami/typo3

Severity

  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
9.0.0
Fixed
9.5.16
Introduced
10.0.0
Fixed
10.4.1