| Vulnerability Name: | CVE-2019-19849 (CCN-173285) | ||||||||||||
| Assigned: | 2019-12-17 | ||||||||||||
| Published: | 2019-12-17 | ||||||||||||
| Updated: | 2019-12-23 | ||||||||||||
| Summary: | An issue was discovered in TYPO3 before 8.7.30, 9.x before 9.5.12, and 10.x before 10.2.2. It has been discovered that the classes QueryGenerator and QueryView are vulnerable to insecure deserialization. One exploitable scenario requires having the system extension ext:lowlevel (Backend Module: DB Check) installed, with a valid backend user who has administrator privileges. The other exploitable scenario requires having the system extension ext:sys_action installed, with a valid backend user who has limited privileges. | ||||||||||||
| CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-502 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-19849 Source: XF Type: UNKNOWN typo3-cve201919849-code-exec(173285) Source: MISC Type: Vendor Advisory https://review.typo3.org/q/%2522Resolves:+%252389005%2522+topic:security Source: CCN Type: TYPO3-CORE-SA-2019-026 Insecure Deserialization in Query Generator & Query View Source: MISC Type: Vendor Advisory https://typo3.org/security/advisory/typo3-core-sa-2019-026/ Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-19849 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||