Описание
Insecure Deserialization in Backend User Settings in TYPO3 CMS
It has been discovered that backend user settings (in $BE_USER->uc) are vulnerable to insecure deserialization. In combination with vulnerabilities of 3rd party components this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability.
Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
References
Ссылки
- https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2wj9-434x-9hvp
- https://nvd.nist.gov/vuln/detail/CVE-2020-11067
- https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2020-11067.yaml
- https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2020-11067.yaml
- https://typo3.org/security/advisory/typo3-core-sa-2020-005
Пакеты
typo3/cms-core
>= 9.0.0, < 9.5.17
9.5.17
typo3/cms-core
>= 10.0.0, < 10.4.2
10.4.2
typo3/cms
>= 10.0.0, < 10.4.2
10.4.2
typo3/cms
>= 9.0.0, < 9.5.17
9.5.17
Связанные уязвимости
In TYPO3 CMS 9.0.0 through 9.5.16 and 10.0.0 through 10.4.1, it has been discovered that backend user settings (in $BE_USER->uc) are vulnerable to insecure deserialization. In combination with vulnerabilities of third party components, this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability. This has been fixed in 9.5.17 and 10.4.2.