SECUNIA ADVISORY ID: SA23446
VERIFY ADVISORY: http://secunia.com/advisories/23446/
CRITICAL: Highly critical
IMPACT: System access
SOFTWARE: TYPO3 4.x - http://secunia.com/product/12113/
DESCRIPTION: Daniel Fabian and J. Greil have reported a vulnerability in TYPO3, which can be exploited by malicious people to gain system access. Input passed to the "userUid" parameter in sysext/rtehtmlarea/htmlarea/plugins/SpellChecker/spell-check-logic.php is not properly sanitised before being used as one of the command line arguments to the "aspell" command. This can be exploited to inject arbitrary shell commands. Successful exploitation requires that "safe_mode" is disabled. NOTE: Another unspecified vulnerability in the same part of the code has also been reported. The vulnerability is reported in versions 4.0 to 4.0.3. Other versions may also be affected.
SOLUTION: Update to version 4.0.4.
PROVIDED AND/OR DISCOVERED BY: Daniel Fabian and J. Greil from SEC CONSULT
ORIGINAL ADVISORY: http://www.sec-consult.com/272.html
OTHER REFERENCES: http://typo3.org/news-single-view/?tx_newsimporter_pi1%5BshowItem%5D=0&cHash=e4a40a11a9
TYPO3 *userUid* Command Execution VulnerabilityPosted on Thursday, December 21, 2006 @ 11:02:06 CST in Security |