Description
In TYPO3 CMS 9.0.0 through 9.5.16 and 10.0.0 through 10.4.1, it has been discovered that backend user settings (in $BE_USER->uc) are vulnerable to insecure deserialization. In combination with vulnerabilities of third party components, this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability. This has been fixed in 9.5.17 and 10.4.2.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0403 | In TYPO3 CMS 9.0.0 through 9.5.16 and 10.0.0 through 10.4.1, it has been discovered that backend user settings (in $BE_USER->uc) are vulnerable to insecure deserialization. In combination with vulnerabilities of third party components, this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability. This has been fixed in 9.5.17 and 10.4.2. |
Github GHSA |
GHSA-2wj9-434x-9hvp | Insecure Deserialization in Backend User Settings in TYPO3 CMS |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T11:21:14.623Z
Reserved: 2020-03-30T00:00:00.000Z
Link: CVE-2020-11067
No data.
Status : Modified
Published: 2020-05-14T00:15:11.400
Modified: 2024-11-21T04:56:43.023
Link: CVE-2020-11067
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA