Learn about CVE-2019-19848 affecting TYPO3 versions prior to 8.7.30, 9.x prior to 9.5.12, and 10.x prior to 10.2.2. Understand the impact, exploitation mechanism, and mitigation steps.
A vulnerability has been found in TYPO3 versions prior to 8.7.30, 9.x prior to 9.5.12, and 10.x prior to 10.2.2, allowing for directory traversal when extracting ZIP archives in the Extension Manager.
Understanding CVE-2019-19848
This CVE identifies a security flaw in TYPO3 versions that could be exploited by attackers with admin privileges.
What is CVE-2019-19848?
The vulnerability in TYPO3 versions prior to 8.7.30, 9.x prior to 9.5.12, and 10.x prior to 10.2.2 allows for directory traversal during the extraction of ZIP archives manually uploaded in the Extension Manager. Admin privileges are required to exploit this vulnerability, with System Maintainer privileges also necessary in versions 9 LTS and later.
The Impact of CVE-2019-19848
The impact of this vulnerability is rated as medium severity with a CVSS base score of 6.8. The confidentiality, integrity, and availability of affected systems are at high risk.
Technical Details of CVE-2019-19848
This section provides more in-depth technical details of the vulnerability.
Vulnerability Description
The vulnerability allows for directory traversal during the extraction of ZIP archives uploaded in the Extension Manager of affected TYPO3 versions.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from CVE-2019-19848 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates