TYPO3 CMS vulnerable to Arbitrary Code Execution via Form Framework
Package
Affected versions
>= 10.0.0, < 10.4.33
>= 11.0.0, < 11.5.20
>= 12.0.0, < 12.1.1
Patched versions
10.4.33
11.5.20
12.1.1
>= 8.0.0, < 8.7.49
>= 9.0.0, < 9.5.38
>= 10.0.0, < 10.4.33
>= 11.0.0, < 11.5.20
>= 12.0.0, < 12.1.1
8.7.49
9.5.38
10.4.33
11.5.20
12.1.1
Description
Published to the GitHub Advisory Database
Dec 13, 2022
Reviewed
Dec 13, 2022
Published by the National Vulnerability Database
Dec 14, 2022
Last updated
Jan 30, 2023
Problem
Due to the lack of separating user-submitted data from the internal configuration in the Form Designer backend module, it was possible to inject code instructions to be processed and executed via TypoScript as PHP code.
The existence of individual TypoScript instructions for a particular form item (known as
formDefinitionOverrides
) and a valid backend user account with access to the form module are needed to exploit this vulnerability.Solution
Update to TYPO3 versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.
References
References