TYPO3-EXT-SA-2020-011: Remote Code Execution in extension "Turn!" (turn)

Categories: Development, Security Created by Torben Hansen
It has been discovered that the extension "Turn!" (turn) is susceptible to Remote Code Execution.
  • Release Date: July 07, 2020
  • Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
  • Component: Turn! (turn)
  • Vulnerability Type: Remote Code Execution
  • Affected Versions: 0.3.2 and below
  • Severity: High
  • Suggested CVSS v3.1: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
  • References: CVE-2020-15515

Problem Description

The extensions fails to sanitize user input resulting in Remote Code Execution. The issue is only exploitable, when the attacker has FTP/SFTP access to the TYPO3 website.

Solution

An updated version 0.3.3 is available from the TYPO3 extension manager, Packagist and at
https://extensions.typo3.org/extension/download/turn/0.3.3/zip
Users of the extension are advised to update the extension as soon as possible.

Credits

Thanks to Jan Bartels for discovering and reporting the vulnerability and to Marc Willmann for providing an updated version of the extension.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.