7.5
CVSSv2

CVE-2020-15086

Published: 29/07/2020 Updated: 18/11/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In TYPO3 installations with the "mediace" extension from version 7.6.2 and before version 7.6.5, it has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. The allows to inject arbitrary data having a valid cryptographic message authentication code and can lead to remote code execution. To successfully exploit this vulnerability, an attacker must have access to at least one `Extbase` plugin or module action in a TYPO3 installation. This is fixed in version 7.6.5 of the "mediace" extension for TYPO3.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

typo3 mediace

Github Repositories

share This is a collection of recent presentations and slides 2019 Aug 1st, 2019: πŸ“„ TYPO3 Developer Days 2019: Hacking TYPO3 🎦 YouTube stream πŸ” TYPO3-CORE-SA-2018-009: Security Misconfiguration in Install Tool Cookie πŸ” TYPO3-CORE-SA-2018-006: Cross-Site Scripting in Online Media Asset Rendering πŸ” TYPO3-CORE-SA-2019-019: Arbitrary Code Execution and Cross-Sit