CVE-2016-15017
low-risk
Published 2023-01-10
A vulnerability has been found in fabarea media_upload on TYPO3 and classified as critical. This vulnerability affects the function getUploadedFileList of the file Classes/Service/UploadFileService.php. The manipulation leads to pathname traversal. Upgrading to version 0.9.0 is able to address this issue. The patch is identified as b25d42a4981072321c1a363311d8ea2a4ac8763a. It is recommended to upgrade the affected component. VDB-217786 is the identifier assigned to this vulnerability.
Do I need to act?
~
1.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
ADJACENT_NETWORK
/ LOW complexity
Affected Products (1)
Media Upload
Affected Vendors
References (10)
Third Party Advisory
https://github.com/fabarea/media_upload/issues/6
Third Party Advisory
https://github.com/fabarea/media_upload/releases/tag/0.9.0
Third Party Advisory
https://vuldb.com/?ctiid.217786
Third Party Advisory
https://vuldb.com/?id.217786
Third Party Advisory
https://github.com/fabarea/media_upload/issues/6
Third Party Advisory
https://github.com/fabarea/media_upload/releases/tag/0.9.0
Third Party Advisory
https://vuldb.com/?ctiid.217786
Third Party Advisory
https://vuldb.com/?id.217786
26
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
3/34 · Minimal
Exposure
5/34 · Minimal