CVE-2019-11831

Source
https://cve.org/CVERecord?id=CVE-2019-11831
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-11831.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-11831
Aliases
Downstream
Published
2019-05-09T04:29:01.100Z
Modified
2026-02-24T01:16:36.435238Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.

References

Affected packages

Git / github.com/typo3/phar-stream-wrapper

Affected ranges

Type
GIT
Repo
https://github.com/typo3/phar-stream-wrapper
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
Fixed
Introduced
Fixed

Affected versions

v.*
v.2.1.0
v2.*
v2.0.0
v2.0.1
v2.1.0
v3.*
v3.0.0
v3.0.1
v3.1.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-11831.json"