Duplicate Advisory: TYPO3 Arbitrary File Read via Directory Traversal
Moderate severity
GitHub Reviewed
Published
Dec 25, 2023
to the GitHub Advisory Database
•
Updated Feb 13, 2024
Withdrawn
This advisory was withdrawn on Feb 13, 2024
Description
Published by the National Vulnerability Database
Dec 25, 2023
Published to the GitHub Advisory Database
Dec 25, 2023
Reviewed
Dec 27, 2023
Withdrawn
Feb 13, 2024
Last updated
Feb 13, 2024
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-w6x2-jg8h-p6mp. This link is maintained to preserve external references.
Original Description
In TYPO3 11.5.24, the filelist component allows attackers (who have access to the administrator panel) to read arbitrary files via directory traversal in the baseuri field, as demonstrated by POST
/typo3/record/edit
with../../../ in data[sys_file_storage]*[data][sDEF][lDEF][basePath][vDEF]
.References