ASA-2019-00259 – TYPO3: Possible Arbitrary Code Execution in Image Processing


Allele Security Alert

ASA-2019-00259

Identifier(s)

ASA-2019-00259, TYPO3-CORE-SA-2019-012

Title

Possible Arbitrary Code Execution in Image Processing

Vendor(s)

TYPO3 Association

Product(s)

TYPO3 CMS

Affected version(s)

TYPO3 CMS versions 8.0.0 up to 8.7.24
TYPO3 CMS versions 9.0.0 up to 9.5.5

Fixed version(s)

TYPO3 CMS versions 8.7.25 or 9.5.6

Proof of concept

Unknown

Description

Image processing, e.g. for generating thumbnails, is actually delegated to ImageMagick (or GraphicsMagick) for the low-level processing. Whenever ImageMagick is invoked in order to convert data the mime-type of the source is identified for invoking according coders when reading data. In case an attacker manages to upload an image file containing PostScript code it will be executed on the server system when generating according visual previews or thumbnails.

In order to exploit this vulnerability the following aspects must be fulfilled:

  • GhostScript binary gs available on server system
  • ImageMagick policy.xml settings are not strict
  • either having a valid backend user account having access to filelist module
  • or having some frontend application that allows uploading and previewing files without according file mime-type validation

Technical details

Unknown

Credits

Lauritz Holtmann

Reference(s)

TYPO3-CORE-SA-2019-012: Possible Arbitrary Code Execution in Image Processing
https://typo3.org/security/advisory/typo3-core-sa-2019-012/

TYPO3 9.5.6 and 8.7.25 security releases published
https://typo3.org/article/typo3-956-and-8725-security-releases-published/

[TYPO3-announce] Announcing TYPO3 v9.5.6 and v8.7.25 security releases
http://lists.typo3.org/pipermail/typo3-announce/2019/000442.html

If there is any error in this alert or you wish a comprehensive analysis, let us know.

Last modified: May 10, 2019

We are not responsible for any data loss, device corruption or any other type of issue due to the use of any information mentioned in our security alerts.