- Release Date: August 9, 2018
- Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
- Vulnerability Type: Information Disclosure
- Affected Versions: 7.2.1 and below
- Severity: Medium
- Suggested CVSS v3.0: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
- CVE: not assigned yet
Problem Description
Due to a missing access check it is possible to view the contents any file within a TYPO3 installation. A valid backend user account having access to the "TemplaVoilà! Plus" backend module is needed in order to exploit this vulnerability.
Solution
An updated version 7.2.2 is available from the TYPO3 extension manager and at https://extensions.typo3.org/extension/download/templavoilaplus/7.2.2/zip/.
Users of the extension are advised to update the extension as soon as possible.
Credits
Thanks to Security Team Member Torben Hansen who discovered and reported the vulnerability.
General Advice
Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.