Bug #18010
closedMalicious code executable as Non-Admin BE-User
0%
Description
Have fun with TYPO3 - get your malicious code executed as Non-Admin BE-User!
Attack-Vector:
1. Take a Non-Admin-BE-User with
- enabled module filelist
- set file-permissions to Upload,Copy,Move,Delete,Rename,New,Edit
- according file-mount set
2. Write malicious php-code & save file as index.php.jdt
3. Login as this BE-User
4. Upload this created file
5. Call this uploaded script with this browser
Explanation:
If apache comes across a file-extension that's not aware of, it shortens the filename by the last part (in this case ".jdt"). Now it checks again, if this is a file extension it's aware of (in this case ".php"). And as this is a PHP-File, it finally passes the file to PHP-processor.
Please check also attachments!
Solution:
Adjust Filename-Deny-Pattern.
Note:
This affects not only file upload but also file-rename function.
I'm sure this issue affects all TYPO3-releases!
OS: FreeBSD
Apache: 2.2
PHP: 5.2.5
TYPO3: 4.1.5
(issue imported from #M7190)
Files