Lucene search

K
githubGitHub Advisory DatabaseGHSA-PPGF-8745-8PGX
HistoryJun 05, 2024 - 4:41 p.m.

Insecure Deserialization & Arbitrary Code Execution in TYPO3 CMS

2024-06-0516:41:48
CWE-502
GitHub Advisory Database
github.com
2
phar files
self extracting archives
source code execution
file extension
obfuscation
user input sanitization
typo3 backend
vulnerability
user account
attack vector
typo3 frontend
exploit

6.9 Medium

AI Score

Confidence

Low

Phar files (formerly known as β€œPHP archives”) can act als self extracting archives which leads to the fact that source code is executed when Phar files are invoked. The Phar file format is not limited to be stored with a dedicated file extension - β€œbundle.phar” would be valid as well as β€œbundle.txt” would be. This way, Phar files can be obfuscated as image or text file which would not be denied from being uploaded and persisted to a TYPO3 installation. Due to a missing sanitization of user input, those Phar files can be invoked by manipulated URLs in TYPO3 backend forms. A valid backend user account is needed to exploit this vulnerability. In theory the attack vector would be possible in the TYPO3 frontend as well, however no functional exploit has been identified so far.

Affected configurations

Vulners
Node
typo3cms_poll_system_extensionRange<9.3.2
OR
typo3cms_poll_system_extensionRange<8.7.17
OR
typo3cms_poll_system_extensionRange<7.6.30

6.9 Medium

AI Score

Confidence

Low