First published: Tue Dec 17 2019(Updated: )
An issue was discovered in TYPO3 before 8.7.30, 9.x before 9.5.12, and 10.x before 10.2.2. It has been discovered that the extraction of manually uploaded ZIP archives in Extension Manager is vulnerable to directory traversal. Admin privileges are required in order to exploit this vulnerability. (In v9 LTS and later, System Maintainer privileges are also required.)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=10.0.0<10.2.1>=8.0.0<8.7.30>=9.0.0<9.5.12 | |
composer/typo3/cms-core | >=10.0.0<10.2.1>=8.0.0<8.7.30>=9.0.0<9.5.12 | |
Typo3 Typo3 | <8.7.30 | |
Typo3 Typo3 | >=9.0.0<9.5.12 | |
Typo3 Typo3 | >=10.0.0<10.2.2 | |
composer/typo3/cms | >=9.0.0<9.5.12 | 9.5.12 |
composer/typo3/cms | >=8.0.0<8.7.30 | 8.7.30 |
composer/typo3/cms | >=10.0.0<10.2.2 | 10.2.2 |
composer/typo3/cms-core | >=9.0.0<9.5.12 | 9.5.12 |
composer/typo3/cms-core | >=8.0.0<8.7.30 | 8.7.30 |
composer/typo3/cms-core | >=10.0.0<10.2.2 | 10.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-19848 is moderate.
The Directory Traversal vulnerability in CVE-2019-19848 allows an attacker to bypass file access restrictions and read arbitrary files by manipulating directory paths.
The affected software versions of CVE-2019-19848 include TYPO3 CMS versions 8.0.0 to 8.7.30, 9.0.0 to 9.5.12, and 10.0.0 to 10.2.1.
To fix the Directory Traversal vulnerability in CVE-2019-19848, you should update TYPO3 CMS to a version that is not vulnerable.
You can find more information about the Directory Traversal vulnerability CVE-2019-19848 in the TYPO3 security advisory TYPO3-CORE-SA-2019-024.