Search for packages
| purl | pkg:composer/typo3/phar-stream-wrapper@3.1.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-349d-w26k-mqfw | Moderately critical - Third-party libraries - SA-CORE-2019-007 The `PharStreamWrapper` (aka `phar-stream-wrapper`) package does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a `phar:///path/bad.phar/../good.phar` URL. |
CVE-2019-11831
GHSA-xv7v-rf6g-xwrc |
| VCID-ddsb-8rn2-x7gb | Insecure Deserialization By-passing Protection of `PharStreamWrapper` Interceptor. |
2019-05-08-1
|
| VCID-hsez-yx7s-uuhn | PharStreamWrapper for Typo3 unsafe deserialization vulnerability PharMetaDataInterceptor in the PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 mishandles Phar stub parsing, which allows attackers to bypass a deserialization protection mechanism. |
CVE-2019-11830
GHSA-3hxw-g85p-qgxm |
| VCID-xvf6-5tjp-b7bu | Insecure Deserialization By-passing Protection of `PharStreamWrapper` Interceptor. |
2019-05-08-2
|