First published: Mon Dec 25 2023(Updated: )
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-w6x2-jg8h-p6mp. This link is maintained to preserve external references. ## Original Description In TYPO3 11.5.24, the filelist component allows attackers (who have access to the administrator panel) to read arbitrary files via directory traversal in the baseuri field, as demonstrated by POST `/typo3/record/edit` with `../../../ in data[sys_file_storage]*[data][sDEF][lDEF][basePath][vDEF]`.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms-core | =11.5.24 | |
composer/typo3/cms-core | =13.0.0 | 13.0.1 |
composer/typo3/cms-core | >=12.0.0<=12.4.10 | 12.4.11 |
composer/typo3/cms-core | >=11.0.0<=11.5.34 | 11.5.35 |
composer/typo3/cms-core | >=10.0.0<=10.4.42 | 10.4.43 |
composer/typo3/cms-core | >=9.0.0<=9.5.45 | 9.5.46 |
composer/typo3/cms-core | >=8.0.0<=8.7.56 | 8.7.57 |
TYPO3 | =11.5.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30451 has been designated as a duplicate advisory and does not have a severity rating as it refers to a previously reported vulnerability.
To remediate CVE-2023-30451, upgrade TYPO3 to version 11.5.35, 12.4.11, 13.0.1 or to the latest available version.
CVE-2023-30451 affects TYPO3 version 11.5.24 and may also impact versions prior to the remedial updates.
Administrators using TYPO3 version 11.5.24 are impacted by CVE-2023-30451 due to vulnerabilities in the filelist component.
CVE-2023-30451 has been withdrawn but is related to path traversal vulnerabilities in TYPO3.