Miggo Logo

CVE-2024-55945: TYPO3 DB Check Module vulnerable to Cross-Site Request Forgery

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.05589%
Published
1/14/2025
Updated
1/14/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
typo3/cms-lowlevelcomposer>= 11.0.0, <= 11.5.4111.5.42

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers on state-changing actions in the DB Check Module (ext:lowlevel) accepting HTTP GET requests without CSRF protection. TYPO3 backend controllers typically implement actions via Extbase, where methods like checkAction and fixAction would handle database operations. The CWE-749 (exposed dangerous methods) and CWE-352 (CSRF) align with these functions if they lack HTTP method enforcement (@TYPO3\CMS\Extbase\Annotation\IgnoreValidation is insufficient) and CSRF token validation. The DatabaseIntegrityController is the logical component for these operations, and the vulnerability description explicitly references improper HTTP method handling in downstream components.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Pro*l*m * vuln*r**ility **s ***n i**nti*i** in t** ***k*n* us*r int*r**** *un*tion*lity involvin* ***p links. Sp**i*i**lly, t*is *un*tion*lity is sus**pti*l* to *ross-Sit* R*qu*st *or**ry (*SR*). ***ition*lly, st*t*-***n*in* **tions in *ownstr**m

Reasoning

T** vuln*r**ility **nt*rs on st*t*-***n*in* **tions in t** ** ****k Mo*ul* (*xt:lowl*v*l) ****ptin* `*TTP` **T r*qu*sts wit*out *SR* prot**tion. `TYPO*` ***k*n* *ontroll*rs typi**lly impl*m*nt **tions vi* `*xt**s*`, w**r* m*t*o*s lik* `****k**tion` *