Skip to main content

CVE-2024-25121: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 typo3

High
VulnerabilityCVE-2024-25121cvecve-2024-25121cwe-200cwe-284
Published: Tue Feb 13 2024 (02/13/2024, 22:14:40 UTC)
Source: CVE
Vendor/Project: TYPO3
Product: typo3

Description

TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions of TYPO3 entities of the File Abstraction Layer (FAL) could be persisted directly via `DataHandler`. This allowed attackers to reference files in the fallback storage directly and retrieve their file names and contents. The fallback storage ("zero-storage") is used as a backward compatibility layer for files located outside properly configured file storages and within the public web root directory. Exploiting this vulnerability requires a valid backend user account. Users are advised to update to TYPO3 version 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, or 13.0.1 which fix the problem described. When persisting entities of the File Abstraction Layer directly via DataHandler, `sys_file` entities are now denied by default, and `sys_file_reference` & `sys_file_metadata` entities are not permitted to reference files in the fallback storage anymore. When importing data from secure origins, this must be explicitly enabled in the corresponding DataHandler instance by using `$dataHandler->isImporting = true;`.

AI-Powered Analysis

AILast updated: 07/05/2025, 00:54:33 UTC

Technical Analysis

CVE-2024-25121 is a high-severity vulnerability affecting multiple versions of TYPO3, an open-source PHP-based web content management system widely used for building and managing websites. The vulnerability arises from improper handling of File Abstraction Layer (FAL) entities via the DataHandler component. Specifically, attackers with valid backend user credentials can persist FAL entities directly, enabling them to reference files stored in the fallback storage (also known as "zero-storage"). This fallback storage is a backward compatibility layer for files located outside properly configured file storages and within the public web root directory. Exploiting this flaw allows unauthorized disclosure of sensitive file names and contents that should otherwise be protected. The vulnerability is rooted in CWE-200 (Exposure of Sensitive Information) and CWE-284 (Improper Access Control), indicating that the system fails to adequately restrict access to sensitive file data. The issue affects TYPO3 versions from 8.0.0 up to but not including the patched versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, and 13.0.1. The fix involves denying direct persistence of sys_file entities by default and preventing sys_file_reference and sys_file_metadata entities from referencing files in fallback storage unless explicitly allowed during secure data imports. The CVSS 3.1 base score is 7.1, reflecting a high severity due to network attack vector, low attack complexity, required privileges (valid backend user), no user interaction, and high confidentiality impact with limited integrity impact and no availability impact. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk to TYPO3 installations with exposed backend access.

Potential Impact

For European organizations, especially those relying on TYPO3 for their web presence, this vulnerability could lead to unauthorized disclosure of sensitive files hosted on their web servers. Since the fallback storage may contain legacy or misconfigured files within the public web root, attackers with backend access could extract confidential information such as configuration files, private documents, or proprietary data. This exposure risks violating data protection regulations like GDPR, potentially resulting in legal penalties and reputational damage. The requirement for valid backend credentials somewhat limits the attack surface; however, compromised or weak backend accounts are common attack vectors. Organizations with large TYPO3 deployments, including government, education, and private sectors, could face targeted exploitation attempts. The integrity and availability of systems are less impacted, but confidentiality breaches could facilitate further attacks or data leaks. Given TYPO3's popularity in Europe, the vulnerability could affect a broad range of sectors, increasing the urgency for patching.

Mitigation Recommendations

European organizations should immediately verify their TYPO3 versions and upgrade to the fixed releases: 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, or 13.0.1. Beyond patching, organizations must audit backend user accounts to ensure strong authentication mechanisms, including enforcing multi-factor authentication (MFA) and reviewing user privileges to minimize access. Restrict backend access via network segmentation and VPNs to reduce exposure. Additionally, review file storage configurations to eliminate or properly secure fallback storage usage, ensuring sensitive files are not publicly accessible. Implement monitoring and alerting on unusual backend activity, especially related to DataHandler operations or file access patterns. For environments importing data from secure origins, ensure the DataHandler instance explicitly enables importing mode as per the patch guidance to avoid misconfigurations. Regularly conduct security assessments and penetration testing focused on backend access controls and file storage permissions to detect potential weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2024-02-05T14:14:46.379Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd75d3

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 12:54:33 AM

Last updated: 7/30/2025, 5:36:03 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats