TYPO3 *userUid* Command Execution Vulnerability

Posted on Thursday, December 21, 2006 @ 12:02:06 UTC in Security
by Raven

SECUNIA ADVISORY ID: SA23446

VERIFY ADVISORY: http://secunia.com/advisories/23446/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: TYPO3 4.x - http://secunia.com/product/12113/

DESCRIPTION: Daniel Fabian and J. Greil have reported a vulnerability in TYPO3, which can be exploited by malicious people to gain system access.
Input passed to the "userUid" parameter in sysext/rtehtmlarea/htmlarea/plugins/SpellChecker/spell-check-logic.php is not properly sanitised before being used as one of the command line arguments to the "aspell" command. This can be exploited to inject arbitrary shell commands. Successful exploitation requires that "safe_mode" is disabled. NOTE: Another unspecified vulnerability in the same part of the code has also been reported. The vulnerability is reported in versions 4.0 to 4.0.3. Other versions may also be affected.

SOLUTION: Update to version 4.0.4.

PROVIDED AND/OR DISCOVERED BY: Daniel Fabian and J. Greil from SEC CONSULT

ORIGINAL ADVISORY: http://www.sec-consult.com/272.html

OTHER REFERENCES: http://typo3.org/news-single-view/?tx_newsimporter_pi1%5BshowItem%5D=0&cHash=e4a40a11a9
 
 
click Related        click Share
 
News ©

Site Info

Last SeenLast Seen
  • vashd1
  • kguske
Server TrafficServer Traffic
  • Total: 482,518,635
  • Today: 30,757
Server InfoServer Info
  • Apr 25, 2024
  • 10:13 pm UTC