In TYPO3 11.5.24, the filelist component allows attackers (who have access to the administrator panel) to read arbitrary files via directory traversal in the baseuri field, as demonstrated by POST /typo3/record/edit with ../../../ in data[sys_file_storage]*[data][sDEF][lDEF][basePath][vDEF].
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w6x2-jg8h-p6mp Path Traversal in TYPO3 File Abstraction Layer Storages
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T14:21:44.837Z

Reserved: 2023-04-08T00:00:00

Link: CVE-2023-30451

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-25T05:15:08.553

Modified: 2024-11-21T08:00:12.673

Link: CVE-2023-30451

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses