CVE-2024-25121

CVSS 3.1 Score 7.1 of 10 (high)

Details

Published Feb 13, 2024
Updated: Feb 14, 2024
CWE ID 284
CWE ID 200

Summary

CVE-2024-25121 is a vulnerability affecting TYPO3, an open-source PHP web content management system. In exploitable versions, entities of the File Abstraction Layer (FAL) can be directly persisted using `DataHandler`, granting attackers access to reference files in the fallback storage and retrieve their names and contents. The fallback storage, used as a compatibility layer for files outside properly configured storages within the public web root, is the target of this issue. To exploit the vulnerability, an authenticated backend user account is required. Users are advised to update to the following TYPO3 versions: 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, or 13.0.1 to resolve the issue. New configurations now prevent `sys_file` entities from being persisted directly via `DataHandler`, while `sys_file_reference` and `sys_file_metadata` entities can no longer reference files in the fallback storage. For secure data imports, explicit enabling of this functionality is mandatory in the DataHandler instance using `$dataHandler->isImporting = true;`.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-25121 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions