Server-side request forgery in extension "Kitodo.Presentation" (dlf)

Categories: Development, Security Created by Torben Hansen
It has been discovered that the extension "Kitodo.Presentation" (dlf) is susceptible to Server-side request forgery.
  • Release Date: February 15, 2022
  • Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
  • Component: "Kitodo.Presentation" (dlf)
  • Vulnerability Type: Server-side request forgery
  • Affected Versions: 3.3.0 - 3.3.3, 3.0.0 - 3.2.2, 2.3.1 and below
  • Severity: High
  • Suggested CVSS: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C
  • References: CVE-2022-24980

Problem Description

A missing access check in an eID script of the extension allows an unauthenticated user to submit arbitrary URLs to this component. This results in Server-side request forgery allowing users to view the content of any file or webpage the webserver has access to.

Solution

Updated versions 3.3.4, 3.2.3 and 2.3.2 are available from the TYPO3 extension manager, Packagist and at
https://extensions.typo3.org/extension/download/dlf/3.3.4/zip
https://extensions.typo3.org/extension/download/dlf/3.2.3/zip
https://extensions.typo3.org/extension/download/dlf/2.3.2/zip
Users of the extension are advised to update the extension as soon as possible.

Credits

Thanks to Kajetan Dvoracek and Alexander Bigga for reporting the issue and to Alexander Bigga for providing an updated version of the extension.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.