GHSA-x428-565f-8xj2: TYPO3 Arbitrary Code Execution and Cross-Site Scripting in Backend API
8.8
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
5/30/2024
Updated
5/30/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
typo3/cms-core | composer | >= 8.0.0, < 8.7.27 | 8.7.27 |
typo3/cms-core | composer | >= 9.0.0, < 9.5.8 | 9.5.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two primary issues: 1) Lack of access control allowing non-admins to modify TSconfig fields, and 2) Insufficient path validation in TSconfig includes. The DataHandler's process_datamap is directly responsible for processing these fields without admin checks (fixed via the PagesTsConfigGuard hook in the patch). The TsConfigLoader's load method is implicated in the directory traversal vulnerability via 'tsconfig_includes', as the patch mentions mitigating traversal in static includes. While the exact pre-patch TsConfigLoader code isn't shown, the CWE-22 reference and commit message strongly suggest this component was vulnerable to path traversal during include resolution.