The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
},
{
"introduced": "7.0"
},
{
"fixed": "7.67"
},
{
"introduced": "8.6.0"
},
{
"fixed": "8.6.16"
},
{
"introduced": "8.7.0"
},
{
"fixed": "8.7.1"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-11831.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "28"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "29"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "30"
}
]
}
]