GHSA-8h28-f46f-m87h

Suggest an improvement
Source
https://github.com/advisories/GHSA-8h28-f46f-m87h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-8h28-f46f-m87h/GHSA-8h28-f46f-m87h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8h28-f46f-m87h
Published
2024-06-05T15:06:18Z
Modified
2024-12-02T05:25:01.519639Z
Summary
Insecure Deserialization in TYPO3 CMS
Details

It has been discovered that the Form Framework (system extension "form") is vulnerable to Insecure Deserialization when being used with the additional PHP PECL package “yaml”, which is capable of unserializing YAML contents to PHP objects. A valid backend user account as well as having PHP setting "yaml.decode_php" enabled is needed to exploit this vulnerability (which is the default value according to PHP documentation).

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-06-05T15:06:18Z"
}
References

Affected packages

Packagist / typo3/cms

Package

Name
typo3/cms
Purl
pkg:composer/typo3/cms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
8.5.0
Fixed
8.7.17

Affected versions

8.*

8.5.0
8.5.1
8.6.0
8.6.1
8.7.0
8.7.1
8.7.2

v8.*

v8.7.3
v8.7.4
v8.7.5
v8.7.6
v8.7.7
v8.7.8
v8.7.9
v8.7.10
v8.7.11
v8.7.12
v8.7.13
v8.7.14
v8.7.15
v8.7.16

Packagist / typo3/cms

Package

Name
typo3/cms
Purl
pkg:composer/typo3/cms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
9.0.0
Fixed
9.3.2

Affected versions

v9.*

v9.0.0
v9.1.0
v9.2.0
v9.2.1
v9.3.0
v9.3.1