Search for vulnerabilities
Vulnerability ID | VCID-qknb-facy-sqck |
Aliases |
GHSA-3gjc-mp82-fj4q
|
Summary | Duplicate Advisory: TYPO3 Arbitrary File Read via Directory Traversal ## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-w6x2-jg8h-p6mp. This link is maintained to preserve external references. ## Original Description In TYPO3 11.5.24, the filelist component allows attackers (who have access to the administrator panel) to read arbitrary files via directory traversal in the baseuri field, as demonstrated by POST `/typo3/record/edit` with `../../../ in data[sys_file_storage]*[data][sDEF][lDEF][basePath][vDEF]`. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 6.2 |
Risk | 3.1 |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
cvssv3.1 | 4.9 | http://packetstormsecurity.com/files/176274/TYPO3-11.5.24-Path-Traversal.html |
generic_textual | MODERATE | http://packetstormsecurity.com/files/176274/TYPO3-11.5.24-Path-Traversal.html |
cvssv3.1_qr | MODERATE | https://github.com/advisories/GHSA-3gjc-mp82-fj4q |
cvssv3.1 | 4.9 | https://github.com/TYPO3-CMS/core |
generic_textual | MODERATE | https://github.com/TYPO3-CMS/core |
cvssv3.1 | 4.9 | https://nvd.nist.gov/vuln/detail/CVE-2023-30451 |
generic_textual | MODERATE | https://nvd.nist.gov/vuln/detail/CVE-2023-30451 |
Reference id | Reference type | URL |
---|---|---|
http://packetstormsecurity.com/files/176274/TYPO3-11.5.24-Path-Traversal.html | ||
https://github.com/TYPO3-CMS/core | ||
https://nvd.nist.gov/vuln/detail/CVE-2023-30451 | ||
GHSA-3gjc-mp82-fj4q | https://github.com/advisories/GHSA-3gjc-mp82-fj4q |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
No EPSS data available for this vulnerability.
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-01T12:14:36.994141+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-3gjc-mp82-fj4q/GHSA-3gjc-mp82-fj4q.json | 36.1.3 |