TYPO3-EXT-SA-2018-003: Environment Variable Injection in extension "Amazon AWS S3 FAL driver (CDN)" (aus_driver_amazon_s3)

Categories: Security Created by Torben Hansen
It has been discovered that the extension "Amazon AWS S3 FAL driver (CDN)" (aus_driver_amazon_s3) is susceptible to Environment Variable Injection.
  • Release Date: August 9, 2018
  • Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
  • Vulnerability Type: Environment Variable Injection
  • Affected Versions: 1.7.0 and below 
  • Severity: High
  • Suggested CVSS v3.0: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE: CVE-2016-5385

Problem Description

The extension uses an old version of the third party library guzzlehttp/guzzle, which is known to be vulnerable against the HTTPOXY attack. Read https://www.symfony.fi/entry/httpoxy-vulnerability-hits-php-installations-using-fastcgi-and-php-fpm-and-hhvm or https://httpoxy.org/ for further details.

Solution

An updated version 1.7.1 is available from the TYPO3 extension manager and at https://extensions.typo3.org/extension/download/aus_driver_amazon_s3/1.7.1/zip/
Users of the extension are advised to update the extension as soon as possible. 

Credits

Thanks to Michael Schams who discovered and reported the vulnerability. 

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.