Skip to main content

CVE-2024-55894: CWE-352: Cross-Site Request Forgery (CSRF) in TYPO3 typo3

Medium
VulnerabilityCVE-2024-55894cvecve-2024-55894cwe-352cwe-749
Published: Tue Jan 14 2025 (01/14/2025, 19:57:28 UTC)
Source: CVE
Vendor/Project: TYPO3
Product: typo3

Description

TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component “Backend User Module” allows attackers to initiate password resets for other backend users or to terminate their user sessions. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described.

AI-Powered Analysis

AILast updated: 07/04/2025, 08:40:49 UTC

Technical Analysis

CVE-2024-55894 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the TYPO3 Content Management Framework, specifically its backend user interface functionality involving deep links. TYPO3 is an open-source CMS widely used for managing websites and web applications. The vulnerability arises because certain state-changing actions in downstream components, particularly the Backend User Module, incorrectly accept HTTP GET requests without enforcing the appropriate HTTP methods (such as POST). This flaw allows attackers to craft malicious URLs that, when visited by an authenticated backend user, can trigger unauthorized actions without their explicit consent. Exploitation requires the victim to have an active backend session and to be tricked into interacting with a malicious link, for example via email or a compromised website. The risk is heightened if specific security settings are misconfigured: if the `security.backend.enforceReferrer` feature is disabled and the `BE/cookieSameSite` setting is lax or none, the CSRF protections are weakened. Successful exploitation can lead to attackers initiating password resets for other backend users or terminating their sessions, potentially disrupting administrative control and user management. TYPO3 versions prior to 10.4.48, 11.5.42, 12.4.25, and 13.4.3 are affected, with patches available in these versions to remediate the issue. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges but does require user interaction, and impacts integrity but not confidentiality or availability.

Potential Impact

For European organizations using TYPO3 as their CMS, this vulnerability poses a moderate risk primarily to the integrity of backend administrative functions. Attackers could disrupt administrative operations by forcing password resets or terminating sessions of backend users, potentially leading to denial of administrative access or unauthorized changes if combined with other vulnerabilities or social engineering. While the vulnerability does not directly compromise data confidentiality or availability, the ability to manipulate backend user sessions can facilitate further attacks or administrative confusion. Organizations with misconfigured security settings (disabled referrer enforcement and lax SameSite cookie policies) are particularly vulnerable. Given TYPO3's popularity in Europe, especially among public sector, education, and medium-sized enterprises, exploitation could impact critical websites and services. However, exploitation requires user interaction and an active backend session, limiting the attack scope to authenticated backend users. No known exploits are currently reported in the wild, but the presence of a patch and public disclosure means attackers may attempt to develop exploits.

Mitigation Recommendations

European organizations should immediately verify and update TYPO3 installations to the fixed versions: 10.4.48 or later, 11.5.42 or later, 12.4.25 or later, and 13.4.3 or later. Beyond patching, administrators should ensure that the `security.backend.enforceReferrer` setting is enabled to enforce strict referrer checks on backend requests. The `BE/cookieSameSite` configuration should be set to 'strict' to prevent cookies from being sent on cross-site requests, mitigating CSRF risks. Additionally, review backend user session management policies to detect unusual session terminations or password reset requests. Implement monitoring and alerting for backend user management activities. Educate backend users about the risks of clicking unsolicited links and encourage the use of multi-factor authentication to reduce the impact of compromised credentials. Finally, consider deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious GET requests targeting backend modules.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2024-12-12T15:03:39.206Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeac97

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 8:40:49 AM

Last updated: 7/28/2025, 2:14:32 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats