Lucene search

K
githubGitHub Advisory DatabaseGHSA-F9HR-7CFQ-MJG2
HistoryMay 30, 2024 - 4:13 p.m.

TYPO3 Arbitrary Code Execution via File List Module

2024-05-3016:13:05
CWE-434
GitHub Advisory Database
github.com
3
typo3
arbitrary code execution
file list module
file uploads
backend users
vulnerability
debian gnu linux
php
server side includes
cgi
file extensions
web server.

7.1 High

AI Score

Confidence

Low

Due to missing file extensions in $GLOBALS[‘TYPO3_CONF_VARS’][‘BE’][‘fileDenyPattern’], backend users are allowed to upload *.phar, *.shtml, *.pl or *.cgi files which can be executed in certain web server setups. A valid backend user account is needed in order to exploit this vulnerability.

Derivatives of Debian GNU Linux are handling *.phar files as PHP applications since PHP 7.1 (for unofficial packages) and PHP 7.2 (for official packages).

The file extension *.shtml is bound to server side includes which are not enabled per default in most common Linux based distributions. File extension *.pl and *.cgi require additional handlers to be configured which is also not the case in most common distributions (except for /cgi-bin/ location).

Affected configurations

Vulners
Node
typo3cms_poll_system_extensionRange<9.5.4
OR
typo3cms_poll_system_extensionRange<8.7.23
CPENameOperatorVersion
typo3/cms-corelt9.5.4
typo3/cms-corelt8.7.23

7.1 High

AI Score

Confidence

Low