Multiple vulnerabilities in extension "File manager" (ameos_filemanager)
November 07, 2017
Author: Torben Hansen
Keywords: TYPO3, security, typo3-ext-sa-2017-008, extension, ameos_filemanager, Remote Code Execution, SQL Injection, SQLi, Information Disclosure
It has been discovered that the extension "File manager" (ameos_filemanager) is susceptible to Remote Code Execution, SQL Injection and Information Disclosure.
Release Date: November 07, 2017
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: version 1.0.1 and below
Vulnerability Type: Remote Code Execution, SQL Injection, Information Disclosure
CVE: not assigned yet
Problem Description: A missing access check in the extension allows an unauthenticated user to upload arbitrary files to the fileadmin folder. Another missing access check allows an unauthenticated user to view file information (filename, description, keywords, categories) of any file in the fileadmin folder by modifying a GET parameter. Failing to properly escape user input, the extension is also susceptible to SQL Injection.
Solution: An updated version 1.0.2 is available from the TYPO3 Extension Manager and at https://extensions.typo3.org/extension/download/ameos_filemanager/1.0.2/zip/. Users of the extension are advised to update the extension as soon as possible.
Credits: Credits go to Michael Helwig who discovered and reported the vulnerability.