Miggo Logo

GHSA-g4xv-r3qw-v3q2: typo3 Information Disclosure Security Note

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
6/5/2024
Updated
6/5/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
typo3/neoscomposer>= 2.3.0, < 2.3.992.3.99
typo3/neoscomposer>= 3.0.0, < 3.0.203.0.20
typo3/neoscomposer>= 3.1.0, < 3.1.183.1.18
typo3/neoscomposer>= 3.2.0, < 3.2.143.2.14
typo3/neoscomposer>= 3.3.0, < 3.3.233.3.23
typo3/neoscomposer>= 4.0.0, < 4.0.174.0.17
typo3/neoscomposer>= 4.1.0, < 4.1.164.1.16
typo3/neoscomposer>= 4.2.0, < 4.2.124.2.12
typo3/neoscomposer>= 4.3.0, < 4.3.34.3.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key mechanisms: 1) The NodeController.showAction handles URL patterns with workspace identifiers without verifying user authentication. 2) The ContextFactory creates workspace contexts based on request parameters without proper access controls. Together these allow unauthenticated users to specify arbitrary workspaces via URL syntax (@workspace-name) and view internal workspaces. The functions are core to the workspace preview feature implementation but lacked necessary security checks in vulnerable versions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*u* to r*ports it **s ***n v*li**t** t**t int*rn*l worksp***s in N*os *r* ****ssi*l* wit*out *ut**nti**tion. Som* us*rs *ssum** t*is is * pl*nn** ***tur* *ut it is not. * worksp*** pr*vi*w s*oul* ** *n ***ition*l ***tur* wit* r*sp**tiv* s**urity m**s

Reasoning

T** vuln*r**ility st*ms *rom two k*y m****nisms: *) T** `No***ontroll*r.s*ow**tion` **n*l*s URL p*tt*rns wit* worksp*** i**nti*i*rs wit*out v*ri*yin* us*r *ut**nti**tion. *) T** `*ont*xt***tory` *r**t*s worksp*** *ont*xts **s** on r*qu*st p*r*m*t*rs