Описание
In TYPO3 installations with the "mediace" extension from version 7.6.2 and before version 7.6.5, it has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. The allows to inject arbitrary data having a valid cryptographic message authentication code and can lead to remote code execution. To successfully exploit this vulnerability, an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation. This is fixed in version 7.6.5 of the "mediace" extension for TYPO3.
Ссылки
- PatchThird Party Advisory
- PatchThird Party Advisory
- ExploitPatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- ExploitPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 7.6.2 (включая) до 7.6.5 (исключая)
cpe:2.3:a:typo3:mediace:*:*:*:*:*:typo3:*:*
EPSS
Процентиль: 88%
0.03678
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-20
NVD-CWE-Other
Связанные уязвимости
CVSS3: 9.8
github
больше 5 лет назад
Potential Remote Code Execution in TYPO3 with mediace extension
EPSS
Процентиль: 88%
0.03678
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-20
NVD-CWE-Other