Multiple vulnerabilities in "Aimeos shop and e-commerce framework" (aimeos)

Categories: Development Created by Torben Hansen
It has been discovered that the extension "Aimeos shop and e-commerce framework" (aimeos) is susceptible to Remote Code Execution and Insecure Direct Object Reference.
  • Release Date: June 18, 2024
  • Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
  • Component: "Aimeos shop and e-commerce framework" (aimeos)
  • Composer Package Name: aimeos/aimeos-typo3
  • Vulnerability Type: Remote Code Execution and Insecure Direct Object Reference
  • Affected Versions: 22.10.9 and below, 23.0.0 - 23.10.6, 24.0.0 - 24.4.1
  • Severity: High
  • Suggested CVSS v3.1: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
  • References: N/A, CWE-73, CWE-639

Problem Description

The extension permits specifying the file extension for uploaded product images. This allows an authenticated admin user to upload a crafted image file with a PHP executable extension, potentially leading to Remote Code Execution (RCE).

The extension does not verify if a specified digital product identifier is authorized for download. This allows an authenticated frontend user to download digital products without completing payment, resulting in an Insecure Direct Object Reference (IDOR) vulnerability.

Solution

Updated versions 22.10.10, 23.10.7 and 24.4.2 are available from the TYPO3 extension manager, packagist and at
https://extensions.typo3.org/extension/download/aimeos/22.10.10/zip
https://extensions.typo3.org/extension/download/aimeos/23.10.7/zip
https://extensions.typo3.org/extension/download/aimeos/24.4.2/zip
Users of the extension are advised to update the extension as soon as possible.

Credits

Thanks to Norbert Sendetzky for providing updated versions of the extension.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.