icon

We found results for “

WS-2017-0298

Good to know:

icon

Date: September 6, 2017

"Failing to properly check user permission on file storages, editors could gain knowledge of protected storages and its folders as well as using them in a file collection being rendered in the frontend. A valid backend user account is needed to exploit this vulnerability."

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Improper Authorization

CWE-285

Top Fix

icon

Upgrade Version

Upgrade to version typo3/cms - dev-TYPO3_8-7;typo3/cms - 8.6.1;typo3/cms - dev-TYPO3_7-6;typo3/cms - 8.7.5;typo3/cms - 8.3.0;typo3/cms - TYPO3_7-6-20;typo3/cms - 7.6.11;typo3/cms - 7.6.13;typo3/cms - 8.5.0;typo3/cms - 8.7.2;typo3/cms - 7.6.19;typo3/cms - 7.6.16;typo3/cms - 8.7.4;typo3/cms - TYPO3_8-7-3;typo3/cms - 7.6.22;typo3/cms - 8.4.0;typo3/cms - 7.6.21;instituteweb/typo3-cms - 8.7.5;instituteweb/typo3-cms - 7.6.22

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us