Lucene search

K
osvGoogleOSV:GHSA-F9HR-7CFQ-MJG2
HistoryMay 30, 2024 - 4:13 p.m.

TYPO3 Arbitrary Code Execution via File List Module

2024-05-3016:13:05
Google
osv.dev
2
typo3
arbitrary code execution
file list module
backend user
file extension
debian gnu linux
php 7.1
php 7.2
server side includes
cgi
linux distributions

7.1 High

AI Score

Confidence

Low

Due to missing file extensions in $GLOBALS[‘TYPO3_CONF_VARS’][‘BE’][‘fileDenyPattern’], backend users are allowed to upload *.phar, *.shtml, *.pl or *.cgi files which can be executed in certain web server setups. A valid backend user account is needed in order to exploit this vulnerability.

Derivatives of Debian GNU Linux are handling *.phar files as PHP applications since PHP 7.1 (for unofficial packages) and PHP 7.2 (for official packages).

The file extension *.shtml is bound to server side includes which are not enabled per default in most common Linux based distributions. File extension *.pl and *.cgi require additional handlers to be configured which is also not the case in most common distributions (except for /cgi-bin/ location).

7.1 High

AI Score

Confidence

Low