Allele Security Alert
ASA-2019-00259
Identifier(s)
ASA-2019-00259, TYPO3-CORE-SA-2019-012
Title
Possible Arbitrary Code Execution in Image Processing
Vendor(s)
TYPO3 Association
Product(s)
TYPO3 CMS
Affected version(s)
TYPO3 CMS versions 8.0.0 up to 8.7.24
TYPO3 CMS versions 9.0.0 up to 9.5.5
Fixed version(s)
TYPO3 CMS versions 8.7.25 or 9.5.6
Proof of concept
Unknown
Description
Image processing, e.g. for generating thumbnails, is actually delegated to ImageMagick (or GraphicsMagick) for the low-level processing. Whenever ImageMagick is invoked in order to convert data the mime-type of the source is identified for invoking according coders when reading data. In case an attacker manages to upload an image file containing PostScript code it will be executed on the server system when generating according visual previews or thumbnails.
In order to exploit this vulnerability the following aspects must be fulfilled:
- GhostScript binary gs available on server system
- ImageMagick policy.xml settings are not strict
- either having a valid backend user account having access to filelist module
- or having some frontend application that allows uploading and previewing files without according file mime-type validation
Technical details
Unknown
Credits
Lauritz Holtmann
Reference(s)
TYPO3-CORE-SA-2019-012: Possible Arbitrary Code Execution in Image Processing
https://typo3.org/security/advisory/typo3-core-sa-2019-012/
TYPO3 9.5.6 and 8.7.25 security releases published
https://typo3.org/article/typo3-956-and-8725-security-releases-published/
[TYPO3-announce] Announcing TYPO3 v9.5.6 and v8.7.25 security releases
http://lists.typo3.org/pipermail/typo3-announce/2019/000442.html
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: May 10, 2019