First published: Mon May 06 2019(Updated: )
By-passing Protection of PharStreamWrapper Interceptor
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/phar-stream-wrapper | >=2.0.0<2.1.1>=3.0.0<3.1.1 | |
Typo3 Pharstreamwrapper | >=2.0.0<2.1.1 | |
Typo3 Pharstreamwrapper | >=3.0.0<3.1.1 | |
composer/typo3/phar-stream-wrapper | >=3.0.0<3.1.1 | 3.1.1 |
composer/typo3/phar-stream-wrapper | >=2.0.0<2.1.1 | 2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11830 is a vulnerability in the PharStreamWrapper package for TYPO3 that allows attackers to bypass a deserialization protection mechanism.
The severity of CVE-2019-11830 is critical with a CVSS score of 9.8.
The PharStreamWrapper package versions 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 are affected by CVE-2019-11830.
To fix CVE-2019-11830, you should update the PharStreamWrapper package to version 2.1.1 or 3.1.1 for TYPO3.
You can find more information about CVE-2019-11830 on the TYPO3 security advisory page, the NVD website, and the TYPO3 phar-stream-wrapper GitHub releases page.