漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Remote Code Execution in extension "Content Element Selector" (ceselector)
Vulnerability Description
The extension passes an attacker-controlled cookie directly to PHP's unserialize() without safely processing the input. A remote, unauthenticated attacker can supply a crafted serialized payload to trigger PHP Object Injection, leading to Remote Code Execution on the TYPO3 server. Exploitation requires the content element to be configured with "Persistent Mode: Static" in the plugin settings.
CVSS Information
N/A
Vulnerability Type
可信数据的反序列化
Vulnerability Title
TYPO3 Extension Content Element Selector 代码问题漏洞
Vulnerability Description
TYPO3 Extension Content Element Selector是TYPO3开源的一个TYPO3内容元素选择扩展。 TYPO3 Extension Content Element Selector存在代码问题漏洞,该漏洞源于扩展直接将攻击者控制的cookie传递给PHP的unserialize()而未安全处理输入,可能导致远程未认证攻击者提供特制序列化有效载荷触发PHP对象注入,导致远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A