TYPO3-EXT-SA-2017-008: Multiple vulnerabilities in extension "File manager" (ameos_filemanager)

November 07, 2017

Category: TYPO3 Extension
Author: Torben Hansen
Keywords: TYPO3, security, typo3-ext-sa-2017-008, extension, ameos_filemanager, Remote Code Execution, SQL Injection, SQLi, Information Disclosure

It has been discovered that the extension "File manager" (ameos_filemanager) is susceptible to Remote Code Execution, SQL Injection and Information Disclosure.

Release Date: November 07, 2017

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 1.0.1 and below

Vulnerability Type: Remote Code Execution, SQL Injection, Information Disclosure

Severity: Critical

Suggested CVSS v3.0: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C (What's that?)

CVE: not assigned yet

Problem Description: A missing access check in the extension allows an unauthenticated user to upload arbitrary files to the fileadmin folder. Another missing access check allows an unauthenticated user to view file information (filename, description, keywords, categories) of any file in the fileadmin folder by modifying a GET parameter. Failing to properly escape user input, the extension is also susceptible to SQL Injection. 

Solution: An updated version 1.0.2 is available from the TYPO3 Extension Manager and at https://extensions.typo3.org/extension/download/ameos_filemanager/1.0.2/zip/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Michael Helwig who discovered and reported the vulnerability.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.