Allele Security Alert
Arbitrary Code Execution via File List Module
TYPO3 CMS versions 8.0.0 up to 8.7.22
TYPO3 CMS versions 9.0.0 up to 9.5.3
TYPO3 CMS version 8.7.23
TYPO3 CMS version 9.5.4
Proof of concept
Due to missing file extensions in $GLOBALS[‘TYPO3_CONF_VARS’][‘BE’][‘fileDenyPattern’], backend users are allowed to upload *.phar, *.shtml, *.pl or *.cgi files which can be executed in certain web server setups. A valid backend user account is needed in order to exploit this vulnerability.
Edgar Boda-Majer, Lauritz Holtmann and Oliver Hader (TYPO3 core team)
TYPO3-CORE-SA-2019-008: Arbitrary Code Execution via File List Module
TYPO3 9.5.4 and 8.7.23 security releases published
[TYPO3-announce] Announcing TYPO3 v9.5.4 and v8.7.23 security releases
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: May 10, 2019