GHSA-45wj-jv2h-jwrf: TYPO3 CMS Privilege Escalation and SQL Injection
7.5
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
5/30/2024
Updated
5/30/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| typo3/cms-core | composer | >= 8.5.0, < 8.7.17 | 8.7.17 |
| typo3/cms-core | composer | >= 9.0.0, < 9.3.2 | 9.3.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two primary issues: improper input validation in the form editor and insecure file handling via FAL. The form editor's save/preview actions did not filter user-submitted form definitions against allowed properties (CWE-89), enabling SQL injection through malicious YAML configurations. Additionally, functions like moveFile and func_edit in FAL-related classes allowed direct manipulation of form definition files (.form.yaml) without proper authorization checks, leading to privilege escalation. The patches introduced validation() checks in the form editor and restricted FAL operations, confirming these functions were vulnerable.