CVE-2019-19848: TYPO3 Directory Traversal on ZIP extraction
(updated )
An issue was discovered in TYPO3 before 8.7.30, 9.x before 9.5.12, and 10.x before 10.2.2. It has been discovered that the extraction of manually uploaded ZIP archives in Extension Manager is vulnerable to directory traversal. Admin privileges are required in order to exploit this vulnerability. (In v9 LTS and later, System Maintainer privileges are also required.)
References
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2019-19848.yaml
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2019-19848.yaml
- github.com/advisories/GHSA-77p4-wfr8-977w
- nvd.nist.gov/vuln/detail/CVE-2019-19848
- review.typo3.org/q/%2522Resolves:+%252388764%2522+topic:security
- typo3.org/security/advisory/typo3-core-sa-2019-024
Detect and mitigate CVE-2019-19848 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →