2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005

Multiple vulnerabilities in extension "File manager" (ameos_filemanager)

November 07, 2017

Author: Torben Hansen
Keywords: TYPO3, security, typo3-ext-sa-2017-008, extension, ameos_filemanager, Remote Code Execution, SQL Injection, SQLi, Information Disclosure

It has been discovered that the extension "File manager" (ameos_filemanager) is susceptible to Remote Code Execution, SQL Injection and Information Disclosure.

Release Date: November 07, 2017

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 1.0.1 and below

Vulnerability Type: Remote Code Execution, SQL Injection, Information Disclosure

Severity: Critical

Suggested CVSS v3.0: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C (What's that?)

CVE: not assigned yet

Problem Description: A missing access check in the extension allows an unauthenticated user to upload arbitrary files to the fileadmin folder. Another missing access check allows an unauthenticated user to view file information (filename, description, keywords, categories) of any file in the fileadmin folder by modifying a GET parameter. Failing to properly escape user input, the extension is also susceptible to SQL Injection. 

Solution: An updated version 1.0.2 is available from the TYPO3 Extension Manager and at https://extensions.typo3.org/extension/download/ameos_filemanager/1.0.2/zip/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Michael Helwig who discovered and reported the vulnerability.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.


Add comment

Please log in or sign up to comment.