GHSA-r287-hc8j-w56h: TYPO3 Information Disclosure Vulnerability Exploitable by Editors
It has been discovered, that editors with access to the file list module could list all files names and folder names in the root directory of a TYPO3 installation. Modification of files, listing further nested directories or retrieving file contents was not possible. A valid backend user account is needed to exploit this vulnerability.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2015-07-01-4.yaml
- github.com/TYPO3/typo3
- github.com/TYPO3/typo3/commit/d9caccb26c954834e7d43fbbe84a3130cc95524a
- github.com/advisories/GHSA-r287-hc8j-w56h
- typo3.org/security/advisory/typo3-core-sa-2015-005
- typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-005
Detect and mitigate GHSA-r287-hc8j-w56h with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →