You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Class destructors causing side-effects when being unserialized in TYPO3 CMS
High severity
GitHub Reviewed
Published
May 12, 2020
in
TYPO3/typo3
•
Updated Feb 7, 2024
The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.
Learn more on MITRE.
The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
Learn more on MITRE.
Calling unserialize() on malicious user-submitted content can result in the following scenarios:
Another insecure deserialization vulnerability is required to actually exploit mentioned aspects.
Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
References
References