TYPO3-EXT-SA-2015-006: Arbitrary Code Execution in extension Frontend User Upload (feupload)

June 15, 2015

Category: TYPO3 Extension
Author: Nicole Cordes
Keywords: TYPO3, security, TYPO3-EXT-SA-2015-006, extension, feupload, Arbitrary Code Execution

It has been discovered that the extension "Frontend User Upload" (feupload) is susceptible to Arbitrary Code Execution

Release Date: June 15, 2015

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions:  version 0.5.0 and below

Vulnerability Type: Arbitrary Code Execution

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:U/RC:C (What's that?)

CVE: not assigned yet

Problem Description: The extension feupload offers the possibility to upload files by using a frontend form. It was discovered that it is possible to upload all kind of files (e.g. PHP) which can be executed afterwards by knowing the filename and guessing the upload folder (which is fileadmin by default).

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author is no longer maintaining this extension. Please uninstall and delete the extension folder from your installation.

Credits: Credits go to Torben Hansen who discovered and reported the issue.


General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.