Allele Security Alert
ASA-2019-00025
Identifier(s)
ASA-2019-00025, TYPO3-CORE-SA-2019-008
Title
Arbitrary Code Execution via File List Module
Vendor(s)
TYPO3
Product(s)
TYPO3 CMS
Affected version(s)
TYPO3 CMS versions 8.0.0 up to 8.7.22
TYPO3 CMS versions 9.0.0 up to 9.5.3
Fixed version(s)
TYPO3 CMS version 8.7.23
TYPO3 CMS version 9.5.4
Proof of concept
Unknown
Description
Due to missing file extensions in $GLOBALS[‘TYPO3_CONF_VARS’][‘BE’][‘fileDenyPattern’], backend users are allowed to upload *.phar, *.shtml, *.pl or *.cgi files which can be executed in certain web server setups. A valid backend user account is needed in order to exploit this vulnerability.
Technical details
Unknown
Credits
Edgar Boda-Majer, Lauritz Holtmann and Oliver Hader (TYPO3 core team)
Reference(s)
TYPO3-CORE-SA-2019-008: Arbitrary Code Execution via File List Module
https://typo3.org/security/advisory/typo3-core-sa-2019-008/
TYPO3 9.5.4 and 8.7.23 security releases published
https://typo3.org/article/typo3-954-and-8723-security-releases-published/
[TYPO3-announce] Announcing TYPO3 v9.5.4 and v8.7.23 security releases
http://lists.typo3.org/pipermail/typo3-announce/2019/000437.html
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: May 10, 2019