Vulnerability Name:

CVE-2019-11831 (CCN-160863)

Assigned:2019-05-08
Published:2019-05-08
Updated:2021-10-01
Summary:The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-22
CWE-502
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2019-11831

Source: BID
Type: Third Party Advisory, VDB Entry
108302

Source: XF
Type: UNKNOWN
typo3-cve201911831-sec-bypass(160863)

Source: MISC
Type: Release Notes, Third Party Advisory
https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1

Source: MISC
Type: Release Notes, Third Party Advisory
https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20190520 [SECURITY] [DLA 1797-1] drupal7 security update

Source: FEDORA
Type: Third Party Advisory
FEDORA-2019-d5f883429d

Source: FEDORA
Type: Third Party Advisory
FEDORA-2019-84a50e34a9

Source: FEDORA
Type: Third Party Advisory
FEDORA-2019-4d93cf2b34

Source: FEDORA
Type: Third Party Advisory
FEDORA-2019-040857fd75

Source: FEDORA
Type: Third Party Advisory
FEDORA-2019-3c89837025

Source: FEDORA
Type: Third Party Advisory
FEDORA-2019-41d6ffd6f0

Source: BUGTRAQ
Type: Issue Tracking, Mailing List, Third Party Advisory
20190515 [SECURITY] [DSA 4445-1] drupal7 security update

Source: CCN
Type: TYPO3-PSA-2019-007
By-passing protection of Phar Stream Wrapper Interceptor

Source: MISC
Type: Vendor Advisory
https://typo3.org/security/advisory/typo3-psa-2019-007/

Source: DEBIAN
Type: Third Party Advisory
DSA-4445

Source: CCN
Type: SA-CORE-2019-007
Drupal core - Moderately critical - Third-party libraries

Source: CONFIRM
Type: Third Party Advisory
https://www.drupal.org/sa-core-2019-007

Source: CONFIRM
Type: Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_19_22

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2019-11831

Vulnerable Configuration:Configuration 1:
  • cpe:/a:typo3:pharstreamwrapper:*:*:*:*:*:*:*:* (Version >= 2.0.0 and < 2.1.1)
  • OR cpe:/a:typo3:pharstreamwrapper:*:*:*:*:*:*:*:* (Version >= 3.0.0 and < 3.1.1)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:fedoraproject:fedora:28:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:29:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:30:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:drupal:drupal:*:*:*:*:*:*:*:* (Version >= 7.0 and < 7.67)
  • OR cpe:/a:drupal:drupal:*:*:*:*:*:*:*:* (Version >= 8.6.0 and < 8.6.16)
  • OR cpe:/a:drupal:drupal:*:*:*:*:*:*:*:* (Version >= 8.7.0 and < 8.7.1)

  • Configuration 5:
  • cpe:/a:joomla:joomla!:*:*:*:*:*:*:*:* (Version >= 3.9.3 and <= 3.9.5)

  • Configuration CCN 1:
  • cpe:/a:drupal:drupal:7.66:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:8.6.15:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:8.7.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.xenial:def:2019118310000000
    V
    CVE-2019-11831 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-05-09
    BACK
    typo3 pharstreamwrapper *
    typo3 pharstreamwrapper *
    debian debian linux 8.0
    debian debian linux 9.0
    fedoraproject fedora 28
    fedoraproject fedora 29
    fedoraproject fedora 30
    drupal drupal *
    drupal drupal *
    drupal drupal *
    joomla joomla! *
    drupal drupal 7.66
    drupal drupal 8.6.15
    drupal drupal 8.7.0 -