ASA-2019-00259 – TYPO3: Possible Arbitrary Code Execution in Image Processing

Allele Security Alert



ASA-2019-00259, TYPO3-CORE-SA-2019-012


Possible Arbitrary Code Execution in Image Processing


TYPO3 Association



Affected version(s)

TYPO3 CMS versions 8.0.0 up to 8.7.24
TYPO3 CMS versions 9.0.0 up to 9.5.5

Fixed version(s)

TYPO3 CMS versions 8.7.25 or 9.5.6

Proof of concept



Image processing, e.g. for generating thumbnails, is actually delegated to ImageMagick (or GraphicsMagick) for the low-level processing. Whenever ImageMagick is invoked in order to convert data the mime-type of the source is identified for invoking according coders when reading data. In case an attacker manages to upload an image file containing PostScript code it will be executed on the server system when generating according visual previews or thumbnails.

In order to exploit this vulnerability the following aspects must be fulfilled:

  • GhostScript binary gs available on server system
  • ImageMagick policy.xml settings are not strict
  • either having a valid backend user account having access to filelist module
  • or having some frontend application that allows uploading and previewing files without according file mime-type validation

Technical details



Lauritz Holtmann


TYPO3-CORE-SA-2019-012: Possible Arbitrary Code Execution in Image Processing

TYPO3 9.5.6 and 8.7.25 security releases published

[TYPO3-announce] Announcing TYPO3 v9.5.6 and v8.7.25 security releases

If there is any error in this alert or you wish a comprehensive analysis, let us know.

Last modified: May 10, 2019

We are not responsible for any data loss, device corruption or any other type of issue due to the use of any information mentioned in our security alerts.