2019-05-09 04:00:47 +00:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2019-11831" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
2019-05-09 20:00:45 +00:00
{
"refsource" : "CONFIRM" ,
"name" : "https://www.drupal.org/sa-core-2019-007" ,
"url" : "https://www.drupal.org/sa-core-2019-007"
} ,
2019-05-09 04:00:47 +00:00
{
"url" : "https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1" ,
"refsource" : "MISC" ,
"name" : "https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1"
} ,
{
"url" : "https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1" ,
"refsource" : "MISC" ,
"name" : "https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1"
} ,
{
"url" : "https://typo3.org/security/advisory/typo3-psa-2019-007/" ,
"refsource" : "MISC" ,
"name" : "https://typo3.org/security/advisory/typo3-psa-2019-007/"
2019-05-11 17:00:45 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://www.synology.com/security/advisory/Synology_SA_19_22" ,
"url" : "https://www.synology.com/security/advisory/Synology_SA_19_22"
2019-05-13 15:00:52 +00:00
} ,
{
"refsource" : "BID" ,
"name" : "108302" ,
"url" : "http://www.securityfocus.com/bid/108302"
2019-05-15 11:00:45 +00:00
} ,
{
"refsource" : "DEBIAN" ,
"name" : "DSA-4445" ,
"url" : "https://www.debian.org/security/2019/dsa-4445"
2019-05-15 12:00:54 +00:00
} ,
{
"refsource" : "BUGTRAQ" ,
"name" : "20190515 [SECURITY] [DSA 4445-1] drupal7 security update" ,
"url" : "https://seclists.org/bugtraq/2019/May/36"
2019-05-17 03:00:54 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-3c89837025" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523/"
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-4d93cf2b34" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR/"
2019-05-17 05:00:44 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-d5f883429d" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW/"
2019-05-20 17:00:46 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20190520 [SECURITY] [DLA 1797-1] drupal7 security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html"
2019-05-25 03:00:46 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-84a50e34a9" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH/"
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-41d6ffd6f0" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4/"
2019-05-25 06:00:50 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-040857fd75" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/"
2019-05-09 04:00:47 +00:00
}
]
}
}