- Release Date: December 13, 2023
- Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
- Component: "Direct Mail" (direct_mail)
- Composer Package Name: directmailteam/direct-mail
- Vulnerability Type: Configuration Injection
- Affected Versions: 6.0.2 and below, 7.0.0 - 7.0.2, 8.0.0 - 9.5.1
- Severity: Medium to high (depending on TYPO3 version)
- Suggested CVSS: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
- References: CVE-2023-50461, CWE-15, CWE-95
Problem Description
The “Configuration” backend module of the extension allows an authenticated user to write arbitrary page TSConfig for folders configured as “Direct Mail”. Exploiting the vulnerability may lead to Configuration Injection (TYPO3 10.4 and above) and to Arbitrary Code Execution (TYPO3 9.5 and below).
A valid backend user account having access to the Direct Mail "Configuration" backend module is needed in order to exploit this vulnerability.
Note: Users of the extension should manually check if a suspicious page TSConfig has been written to all folders configured as “Direct Mail”.
Solution
Updated versions 6.0.3, 7.0.3 and 9.5.2 are available from the TYPO3 extension manager, packagist and at
https://extensions.typo3.org/extension/download/direct_mail/6.0.3/zip
https://extensions.typo3.org/extension/download/direct_mail/7.0.3/zip
https://extensions.typo3.org/extension/download/direct_mail/9.5.2/zip
Users of the extension are advised to update the extension as soon as possible.
Credits
Thanks to Christoph Lehmann for reporting the vulnerability and to Ivan Kartolo for providing updated versions of the extension.
General Advice
Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.