CVE-2019-11831

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.

References

https://typo3.org/security/advisory/typo3-psa-2019-007/

https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1

https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1

https://www.drupal.org/sa-core-2019-007

https://www.synology.com/security/advisory/Synology_SA_19_22

http://www.securityfocus.com/bid/108302

https://www.debian.org/security/2019/dsa-4445

https://seclists.org/bugtraq/2019/May/36

https://lists.fedoraproject.org/archives/list/[email protected]/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523/

https://lists.fedoraproject.org/archives/list/[email protected]/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR/

https://lists.fedoraproject.org/archives/list/[email protected]/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW/

https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4/

https://lists.fedoraproject.org/archives/list/[email protected]/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH/

https://lists.fedoraproject.org/archives/list/[email protected]/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/

Details

Source: MITRE

Published: 2019-05-09

Updated: 2021-10-01

Type: CWE-22

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
126314Fedora 29 : php-brumann-polyfill-unserialize / php-typo3-phar-stream-wrapper2 (2019-af7bef7165)NessusFedora Local Security Checks
critical
126265Fedora 30 : php-brumann-polyfill-unserialize / php-typo3-phar-stream-wrapper2 (2019-a8121923d5)NessusFedora Local Security Checks
critical
125430Fedora 30 : drupal7 (2019-84a50e34a9)NessusFedora Local Security Checks
critical
125425Fedora 28 : drupal7 (2019-41d6ffd6f0)NessusFedora Local Security Checks
critical
125418Fedora 29 : drupal7 (2019-040857fd75)NessusFedora Local Security Checks
critical
98604Drupal 7.x < 7.67 Third-Party Libraries VulnerabilityWeb Application ScanningComponent Vulnerability
critical
98603Drupal 8.6.x < 8.6.16 Third-Party Libraries VulnerabilityWeb Application ScanningComponent Vulnerability
critical
98602Drupal 8.7.x < 8.7.1 Third-Party Libraries VulnerabilityWeb Application ScanningComponent Vulnerability
critical
125298Debian DLA-1797-1 : drupal7 security updateNessusDebian Local Security Checks
critical
125233Fedora 29 : php-typo3-phar-stream-wrapper (2019-d5f883429d)NessusFedora Local Security Checks
critical
125231Fedora 28 : php-typo3-phar-stream-wrapper (2019-4d93cf2b34)NessusFedora Local Security Checks
critical
125230Fedora 30 : php-typo3-phar-stream-wrapper (2019-3c89837025)NessusFedora Local Security Checks
critical
125096Debian DSA-4445-1 : drupal7 - security updateNessusDebian Local Security Checks
critical
700664Drupal 7.x < 7.67 / 8.6.x < 8.6.16 / 8.7.x < 8.7.1 (SA-CORE-2019-007)Nessus Network MonitorCGI
critical
124698Drupal 7.0.x < 7.67 / 8.6.x < 8.6.16 / 8.7.x < 8.7.1 Drupal Vulnerability (SA-CORE-2019-007)NessusCGI abuses
critical