Miggo Logo

CVE-2024-34358:
TYPO3 vulnerable to an Uncontrolled Resource Consumption in the ShowImageController

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.04975%
Published
5/14/2024
Updated
5/14/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
typo3/cms-corecomposer>= 9.0.0, <= 9.5.479.5.48
typo3/cms-corecomposer>= 10.0.0, <= 10.4.4410.4.45
typo3/cms-corecomposer>= 11.0.0, <= 11.5.3611.5.37
typo3/cms-corecomposer>= 12.0.0, <= 12.4.1412.4.15
typo3/cms-corecomposer>= 13.0.0, <= 13.1.013.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the unvalidated 'frame' parameter handling in ShowImageController. The pre-patch code in initialize() retrieved $this->frame from request parameters without HMAC checks (visible in the diff). This lack of signature verification enabled attackers to manipulate the parameter freely. The fix introduced a feature flag guard and validation, confirming this was the attack vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Pro*l*m T** `S*owIm****ontroll*r` (_*I* tx_*ms_s*owpi*_) l**ks * *rypto*r*p*i* *M**-si*n*tur* on t** `*r*m*` *TTP qu*ry p*r*m*t*r (*.*. `/in**x.p*p?*I*=tx_*ms_s*owpi*?*il*=*&...&*r*m*=*****`). T*is *llows **v*rs*ri*s to instru*t t** syst*m to pro

Reasoning

T** vuln*r**ility st*ms *rom t** unv*li**t** '*r*m*' p*r*m*t*r **n*lin* in S*owIm****ontroll*r. T** pr*-p*t** *o** in `initi*liz*()` r*tri*v** $t*is->*r*m* *rom r*qu*st p*r*m*t*rs wit*out *M** ****ks (visi*l* in t** *i**). T*is l**k o* si*n*tur* v*ri