Vulnerability DatabaseGHSA-8h4m-r4wm-xj7r

GHSA-8h4m-r4wm-xj7r
PHP vulnerability analysis and mitigation

Overview

The TYPO3 CMS vulnerability (GHSA-8h4m-r4wm-xj7r) involves arbitrary code execution via the File List Module, discovered and disclosed on January 22, 2019. The vulnerability affects TYPO3 CMS versions 8.0.0 to 8.7.22 and 9.0.0 to 9.5.3. This security issue allows backend users to upload potentially executable files with extensions like .phar, .shtml, .pl, or .cgi, which could be executed in certain web server configurations (TYPO3 Advisory).

Technical details

The vulnerability stems from missing file extensions in $GLOBALS['TYPO3_CONF_VARS']['BE']['fileDenyPattern']. The issue has a CVSS v3.1 base score of 8.8 (High), with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. Notably, Debian GNU Linux derivatives handle *.phar files as PHP applications since PHP 7.1 for unofficial packages and PHP 7.2 for official packages. The vulnerability is tracked as CWE-434 (GitHub Advisory).

Impact

The vulnerability can lead to arbitrary code execution on affected systems. It affects system confidentiality, integrity, and availability with high severity ratings. The impact is particularly significant on systems where specific file handlers are configured, especially for *.phar files in Debian-based systems (GitHub Advisory, TYPO3 Advisory).

Mitigation and workarounds

The vulnerability was patched in TYPO3 versions 8.7.23 and 9.5.4. The fix involved extending the file deny pattern to include additional potentially dangerous file extensions. The patch was implemented through commits that modified the SystemEnvironmentBuilder.php file to update both FILEDENYPATTERNDEFAULT and PHPEXTENSIONS_DEFAULT configurations (TYPO3 Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management