| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| codingms/modules | composer | < 4.3.11 | 4.3.11 |
| codingms/modules | composer | >= 5.0.0, < 5.7.4 | 5.7.4 |
| codingms/modules | composer | >= 7.0.0, < 7.5.5 | 7.5.5 |
| codingms/modules | composer | >= 6.0.0, < 6.4.2 | 6.4.2 |
The analysis of the provided patch commit reveals an improper authentication vulnerability within the 'Modules' TYPO3 extension. The core of the issue is in the loginAsFrontendUser function located in Classes/Utility/FrontendUserUtility.php. Before the patch, this function checked if a user was an administrator but critically failed to verify if the user was actually logged in to the backend. This was facilitated by the getBackendUserAuthentication helper function, which insecurely fetched the user object from a global variable. An attacker could exploit this flaw to bypass authentication and impersonate a frontend user. The patch rectifies this by introducing a robust check for an active backend user session using Context->getPropertyFromAspect('backend.user', 'isLoggedIn') and removing the insecure getBackendUserAuthentication function. The identified vulnerable functions, loginAsFrontendUser and getBackendUserAuthentication, would be present in the runtime profile during an exploit of this vulnerability.
CodingMs\Modules\Utility\FrontendUserUtility::loginAsFrontendUserClasses/Utility/FrontendUserUtility.php
CodingMs\Modules\Utility\FrontendUserUtility::getBackendUserAuthenticationClasses/Utility/FrontendUserUtility.php
Ongoing coverage of React2Shell