Miggo Logo

GHSA-5h5v-m596-r6rf: TYPO3 Possible Insecure Deserialization in Extbase Request Handling

8.1

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
5/30/2024
Updated
5/30/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
typo3/cms-corecomposer>= 8.0.0, < 8.7.308.7.30
typo3/cms-corecomposer>= 9.0.0, < 9.5.129.5.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Extbase's request handling mechanism where user-submitted payloads are deserialized after HMAC verification. The RequestBuilder::build method is responsible for constructing the request object and processing parameters. Since the deserialization occurs after HMAC validation (which depends on the encryptionKey), a compromised key allows attackers to sign malicious payloads and trigger unsafe deserialization via PHP's unserialize() function. This matches the CWE-502 pattern where trusted validation (HMAC) becomes ineffective due to secret leakage.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

It **s ***n *is*ov*r** t**t r*qu*st **n*lin* in *xt**s* **n ** vuln*r**l* to ins**ur* **s*ri*liz*tion. Us*r su*mitt** p*ylo** **s to ** si*n** wit* * *orr*spon*in* *M**-S*** usin* t** s*nsitiv* TYPO* *n*ryptionK*y *s s**r*t - inv*li* or unsi*n** p*yl

Reasoning

T** vuln*r**ility st*ms *rom *xt**s*'s r*qu*st **n*lin* m****nism w**r* us*r-su*mitt** p*ylo**s *r* **s*ri*liz** **t*r *M** v*ri*i**tion. T** R*qu*st*uil**r::*uil* m*t*o* is r*sponsi*l* *or *onstru*tin* t** r*qu*st o*j**t *n* pro**ssin* p*r*m*t*rs. S