#VU13830 Insecure deserialization in TYPO3

 

#VU13830 Insecure deserialization in TYPO3

Published: July 12, 2018 / Updated: October 18, 2018


Vulnerability identifier: #VU13830
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-502
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
TYPO3
Software vendor:
TYPO3

Description

The vulnerability allows a remote authenticated user to compromise vulnerable system.

The vulnerability exists due to improper sanitization of user-supplied data in the Form Framework (system extension "form") when being used with the additional PHP PECL package “yaml”. A privileged attacker can upload a specially crafted form template and execute arbitrary PHP code on the server.

Successful exploitation of the vulnerability requires that setting "yaml.decode_php" option is enabled.



Remediation

Update to  version 8.7.17 or 9.3.1.

External links