First published: Tue May 12 2020(Updated: )
Calling unserialize() on malicious user-submitted content can result in the following scenarios: - trigger deletion of arbitrary directory in file system (if writable for web server) - trigger message submission via email using identity of web site (mail relay) Another insecure deserialization vulnerability is required to actually exploit mentioned aspects. Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described. ### References * https://typo3.org/security/advisory/typo3-core-sa-2020-004
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=10.0.0<10.4.2>=9.0.0<9.5.17 | |
composer/typo3/cms-core | >=10.0.0<10.4.2>=9.0.0<9.5.17 | |
Typo3 Typo3 | >=9.0.0<9.5.17 | |
Typo3 Typo3 | >=10.0.0<10.4.2 | |
composer/typo3/cms | >=9.0.0<9.5.17 | 9.5.17 |
composer/typo3/cms | >=10.0.0<10.4.2 | 10.4.2 |
composer/typo3/cms-core | >=10.0.0<10.4.2 | 10.4.2 |
composer/typo3/cms-core | >=9.0.0<9.5.17 | 9.5.17 |
>=9.0.0<9.5.17 | ||
>=10.0.0<10.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Vulnerability CVE-2020-11066, also known as TYPO3-CORE-SA-2020-004, is a security vulnerability that allows class destructors to cause side effects when being unserialized in TYPO3 CMS.
TYPO3 CMS versions 9.0.0 up to 9.5.17 and versions 10.0.0 up to 10.4.2 are affected by CVE-2020-11066.
The severity of vulnerability CVE-2020-11066 is not provided in the available information.
To fix vulnerability CVE-2020-11066, it is recommended to upgrade to TYPO3 CMS versions 9.5.18 or 10.4.3, or apply the provided patches.
You can find more information about vulnerability CVE-2020-11066 in the TYPO3 security advisory TYPO3-CORE-SA-2020-004, available at https://typo3.org/security/advisory/typo3-core-sa-2020-004.