CVE-2008-2717: TYPO3 Unrestricted File Upload vulnerability
6.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.5961%
CWE
Published
5/1/2022
Updated
2/9/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:L/Au:S/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
typo3/cms-core | composer | >= 4.0.0, < 4.0.9 | 4.0.9 |
typo3/cms-core | composer | >= 4.1.0, < 4.1.7 | 4.1.7 |
typo3/cms-core | composer | >= 4.2.0, < 4.2.1 | 4.2.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from TYPO3's use of an insufficient 'fileDenyPattern' regex in Apache configurations. The security bulletin explicitly identifies t3lib_div::verifyFilenameAgainstDenyPattern
as the function responsible for enforcing this pattern during file operations. Since this function relied on the vulnerable default regex (which lacked proper restrictions for fileDenyPattern
and multi-extension PHP
files), it directly enabled the upload bypass. The function's central role in filename
validation and its dependency on the flawed configuration make it the clear vulnerable component.