Search for vulnerabilities
Vulnerability details: VCID-35zf-t4ak-aaae
Vulnerability ID VCID-35zf-t4ak-aaae
Aliases CVE-2019-11831
GHSA-xv7v-rf6g-xwrc
Summary The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00555 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00649 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00649 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00784 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00784 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00784 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00784 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00803 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00803 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
epss 0.01034 https://api.first.org/data/v1/epss?cve=CVE-2019-11831
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-xv7v-rf6g-xwrc
cvssv3.1 9.8 https://github.com/TYPO3/phar-stream-wrapper
generic_textual CRITICAL https://github.com/TYPO3/phar-stream-wrapper
cvssv3.1 9.8 https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1
generic_textual CRITICAL https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1
cvssv3.1 9.8 https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1
generic_textual CRITICAL https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1
cvssv3.1 9.8 https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html
generic_textual CRITICAL https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-11831
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2019-11831
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2019-11831
cvssv3.1 9.8 https://seclists.org/bugtraq/2019/May/36
generic_textual CRITICAL https://seclists.org/bugtraq/2019/May/36
cvssv3.1 9.8 https://typo3.org/security/advisory/typo3-psa-2019-007
generic_textual CRITICAL https://typo3.org/security/advisory/typo3-psa-2019-007
cvssv3.1 9.8 https://www.debian.org/security/2019/dsa-4445
generic_textual CRITICAL https://www.debian.org/security/2019/dsa-4445
cvssv3.1 9.8 https://www.drupal.org/sa-core-2019-007
generic_textual CRITICAL https://www.drupal.org/sa-core-2019-007
cvssv3.1 9.8 https://www.synology.com/security/advisory/Synology_SA_19_22
generic_textual CRITICAL https://www.synology.com/security/advisory/Synology_SA_19_22
cvssv3.1 9.8 http://www.securityfocus.com/bid/108302
generic_textual CRITICAL http://www.securityfocus.com/bid/108302
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2019-11831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11831
https://github.com/TYPO3/phar-stream-wrapper
https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1
https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1
https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4/
https://seclists.org/bugtraq/2019/May/36
https://typo3.org/security/advisory/typo3-psa-2019-007
https://typo3.org/security/advisory/typo3-psa-2019-007/
https://www.debian.org/security/2019/dsa-4445
https://www.drupal.org/sa-core-2019-007
https://www.drupal.org/SA-CORE-2019-007
https://www.synology.com/security/advisory/Synology_SA_19_22
http://www.securityfocus.com/bid/108302
928688 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928688
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:pharstreamwrapper:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:pharstreamwrapper:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
CVE-2019-11831 https://nvd.nist.gov/vuln/detail/CVE-2019-11831
CVE-2019-11831.YAML https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2019-11831.yaml
CVE-2019-11831.YAML https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-11831.yaml
CVE-2019-11831.YAML https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/phar-stream-wrapper/CVE-2019-11831.yaml
GHSA-xv7v-rf6g-xwrc https://github.com/advisories/GHSA-xv7v-rf6g-xwrc
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/TYPO3/phar-stream-wrapper
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2019-11831
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-11831
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-11831
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://seclists.org/bugtraq/2019/May/36
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://typo3.org/security/advisory/typo3-psa-2019-007
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2019/dsa-4445
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.drupal.org/sa-core-2019-007
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.synology.com/security/advisory/Synology_SA_19_22
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.securityfocus.com/bid/108302
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.36232
EPSS Score 0.00178
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.