TYPO3.CMS.Phar.Insecure.Deserialization

description-logoDescription

This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in Typo3 CMS.
A remote authenticated attacker can exploit this vulnerability by uploading a specially crafted PHAR file to the target server. Successful exploitation will result in arbitrary code execution within the security context of the user running Typo3 CMS.

affected-products-logoAffected Products

TYPO3 Association TYPO3 prior to 7.6.30
TYPO3 Association TYPO3 prior to 8.7.17
TYPO3 Association TYPO3 prior to 9.3.1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems

recomended-action-logoRecommended Actions

Refer to the vendor's advisory for updates:
https://typo3.org/security/advisory/typo3-core-sa-2018-002/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-08-01 25.612 Name:Typo3.
CMS.
Phar.
Insecure.
Deserialization:TYPO3.
CMS.
Phar.
Insecure.
Deserialization
2019-03-12 14.571 Default_action:pass:drop
2019-02-13 14.552