GHSA-8h28-f46f-m87h: Insecure Deserialization in TYPO3 CMS
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
6/5/2024
Updated
6/5/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
typo3/cms | composer | >= 8.5.0, < 8.7.17 | 8.7.17 |
typo3/cms | composer | >= 9.0.0, < 9.3.2 | 9.3.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises from the combination of TYPO3's Form Framework using the PECL yaml extension with the 'yaml.decode_php' setting enabled (default). This allows yaml_parse() to deserialize PHP objects via YAML's !php/object tags. The advisory explicitly links the vulnerability to this configuration and YAML processing in the form extension. While the exact file path isn't provided in available resources, yaml_parse() is the core function enabling object deserialization in this context.