
We found results for “”
WS-2018-0048
Good to know:

Date: November 22, 2016
Path Traversal vulnerability in TYPO3 6.2.0 before 6.2.29, 7.6.0 before 7.6.13 and 8.0.0 before 8.4.1. Due to a too loose type check in an API method, attackers could bypass the directory traversal check by providing an invalid UTF-8 encoding sequence.
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-22Top Fix

Upgrade Version
Upgrade to version typo3/cms - 6.2.2;typo3/cms - 6.2.16;typo3/cms - dev-TYPO3_6-2;typo3/cms - 6.2.10-rc1;typo3/cms - 7.6.13;typo3/cms - 8.4.0;typo3/cms - 6.2.28;typo3/cms - 6.2.8;typo3/cms - TYPO3_7-6-13;typo3/cms - dev-TYPO3_8-4;typo3/cms - dev-TYPO3_7-6;typo3/cms - 6.2.13;typo3/cms - TYPO3_6-2-29;typo3/cms - 6.2.19;typo3/cms - 8.3.0;typo3/cms - 6.2.24;typo3/cms - 7.6.11;instituteweb/typo3-cms - 7.6.13;instituteweb/typo3-cms - 8.4.1;instituteweb/typo3-cms - 6.2.29
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | REQUIRED |
Scope (S): | CHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |