First published: Tue Jun 25 2019(Updated: )
Insecure Deserialization in TYPO3 CMS
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=8.0.0<8.7.27>=9.0.0<9.5.8 | |
composer/typo3/cms-core | >=8.0.0<8.7.27>=9.0.0<9.5.8 | |
composer/typo3/cms | >=9.0.0<9.5.8 | 9.5.8 |
composer/typo3/cms | >=8.0.0<8.7.27 | 8.7.27 |
composer/typo3/cms-core | >=9.0.0<9.5.8 | 9.5.8 |
composer/typo3/cms-core | >=8.0.0<8.7.27 | 8.7.27 |
TYPO3 | >=8.3.0<=8.7.26 | |
TYPO3 | >=9.0.0<=9.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-12747 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2019-12747, update TYPO3 CMS to version 8.7.27 or 9.5.8.
CVE-2019-12747 affects TYPO3 versions 8.x prior to 8.7.27 and 9.x prior to 9.5.8.
CVE-2019-12747 exploits insecure deserialization of untrusted data in TYPO3 CMS.
Yes, if your TYPO3 installation is updated to versions 8.7.27 or 9.5.8, it is no longer vulnerable to CVE-2019-12747.