ASA-2019-00416 – TYPO3: Broken Access Control in Import Module


Allele Security Alert

ASA-2019-00416

Identifier(s)

ASA-2019-00416, TYPO3-CORE-SA-2019-017

Title

Broken Access Control in Import Module

Vendor(s)

TYPO3 Association

Product(s)

TYPO3 CMS

Affected version(s)

TYPO3 CMS versions 9.3.0 to 9.5.7

Fixed version(s)

TYPO3 CMS version 9.5.8

Proof of concept

Unknown

Description

It has been discovered that the Import/Export module is susceptible to broken access control. Regular backend users have access to import functionality which usually only is available to admin users or users having User TSconfig setting options.impexp.enableImportForNonAdminUser explicitly enabled.

Database content to be imported however was correctly checked against users’ permissions and not affected. However it was possible to upload files by-passing restrictions of the file abstraction layer (FAL) – however this did not affect executable files which have been correctly secured by fileDenyPattern.

Currently the only known vulnerability is to directly inject *.form.yaml files which could be used to trigger the vulnerability of TYPO3-CORE-SA-2018-003 (privilege escalation & SQL injection) – which requires the Form Framework (ext:form) being available on an according website.

Technical details

Unknown

Credits

Oliver Hader

Reference(s)

TYPO3 9.5.8 and 8.7.27 security releases published
https://typo3.org/article/typo3-958-and-8727-security-releases-published/

TYPO3-CORE-SA-2019-017: Broken Access Control in Import Module
https://typo3.org/security/advisory/typo3-core-sa-2019-017/

[TYPO3-announce] Announcing TYPO3 v9.5.8 and v8.7.27 security releases
http://lists.typo3.org/pipermail/typo3-announce/2019/000447.html

If there is any error in this alert or you wish a comprehensive analysis, let us know.

Last modified: July 11, 2019

We are not responsible for any data loss, device corruption or any other type of issue due to the use of any information mentioned in our security alerts.