First published: Mon Dec 25 2023(Updated: )
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-w6x2-jg8h-p6mp. This link is maintained to preserve external references. ## Original Description In TYPO3 11.5.24, the filelist component allows attackers (who have access to the administrator panel) to read arbitrary files via directory traversal in the baseuri field, as demonstrated by POST `/typo3/record/edit` with `../../../ in data[sys_file_storage]*[data][sDEF][lDEF][basePath][vDEF]`.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Typo3 Typo3 | =11.5.24 | |
composer/typo3/cms-core | =11.5.24 | |
composer/typo3/cms-core | =13.0.0 | 13.0.1 |
composer/typo3/cms-core | >=12.0.0<=12.4.10 | 12.4.11 |
composer/typo3/cms-core | >=11.0.0<=11.5.34 | 11.5.35 |
composer/typo3/cms-core | >=10.0.0<=10.4.42 | 10.4.43 |
composer/typo3/cms-core | >=9.0.0<=9.5.45 | 9.5.46 |
composer/typo3/cms-core | >=8.0.0<=8.7.56 | 8.7.57 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.