Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. typo3/cms
  4. ›
  5. GHSA-8h28-f46f-m87h

GHSA-8h28-f46f-m87h: Insecure Deserialization in TYPO3 CMS

June 5, 2024

It has been discovered that the Form Framework (system extension “form”) is vulnerable to Insecure Deserialization when being used with the additional PHP PECL package “yaml”, which is capable of unserializing YAML contents to PHP objects. A valid backend user account as well as having PHP setting “yaml.decode_php” enabled is needed to exploit this vulnerability (which is the default value according to PHP documentation).

References

  • github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2018-07-12-4.yaml
  • github.com/TYPO3/typo3
  • github.com/advisories/GHSA-8h28-f46f-m87h
  • typo3.org/security/advisory/typo3-core-sa-2018-004

Code Behaviors & Features

Detect and mitigate GHSA-8h28-f46f-m87h with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 8.5.0 before 8.7.17, all versions starting from 9.0.0 before 9.3.2

Fixed versions

  • 8.7.17
  • 9.3.2

Solution

Upgrade to versions 8.7.17, 9.3.2 or above.

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

packagist/typo3/cms/GHSA-8h28-f46f-m87h.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:48 +0000.