Release Date: November 07, 2017
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: version 1.0.1 and below
Vulnerability Type: Remote Code Execution, SQL Injection, Information Disclosure
Suggested CVSS v3.0: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C (What's that?)
CVE: not assigned yet
Problem Description: A missing access check in the extension allows an unauthenticated user to upload arbitrary files to the fileadmin folder. Another missing access check allows an unauthenticated user to view file information (filename, description, keywords, categories) of any file in the fileadmin folder by modifying a GET parameter. Failing to properly escape user input, the extension is also susceptible to SQL Injection.
Solution: An updated version 1.0.2 is available from the TYPO3 Extension Manager and at https://extensions.typo3.org/extension/download/ameos_filemanager/1.0.2/zip/. Users of the extension are advised to update the extension as soon as possible.
Credits: Credits go to Michael Helwig who discovered and reported the vulnerability.
General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.