Project

General

Profile

Actions

Bug #18010

closed

Malicious code executable as Non-Admin BE-User

Added by Rechenzentrum TU over 16 years ago. Updated over 15 years ago.

Status:
Closed
Priority:
Must have
Category:
-
Target version:
-
Start date:
2008-01-17
Due date:
% Done:

0%

Estimated time:
TYPO3 Version:
4.1
PHP Version:
5.2
Tags:
Complexity:
Is Regression:
Sprint Focus:

Description

Have fun with TYPO3 - get your malicious code executed as Non-Admin BE-User!

Attack-Vector:
1. Take a Non-Admin-BE-User with
- enabled module filelist
- set file-permissions to Upload,Copy,Move,Delete,Rename,New,Edit
- according file-mount set
2. Write malicious php-code & save file as index.php.jdt
3. Login as this BE-User
4. Upload this created file
5. Call this uploaded script with this browser

Explanation:
If apache comes across a file-extension that's not aware of, it shortens the filename by the last part (in this case ".jdt"). Now it checks again, if this is a file extension it's aware of (in this case ".php"). And as this is a PHP-File, it finally passes the file to PHP-processor.

Please check also attachments!

Solution:
Adjust Filename-Deny-Pattern.

Note:
This affects not only file upload but also file-rename function.

I'm sure this issue affects all TYPO3-releases!

OS: FreeBSD
Apache: 2.2
PHP: 5.2.5
TYPO3: 4.1.5
(issue imported from #M7190)


Files

ModFilelistAttack-0.png (52.2 KB) ModFilelistAttack-0.png Administrator Admin, 2008-01-17 13:43
ModFilelistAttack-1.png (17.2 KB) ModFilelistAttack-1.png Administrator Admin, 2008-01-17 13:43
ModFilelistAttack-2.png (36.1 KB) ModFilelistAttack-2.png Administrator Admin, 2008-01-17 13:44
ModFilelistAttack-3.png (22.7 KB) ModFilelistAttack-3.png Administrator Admin, 2008-01-17 13:44
ModFilelistAttack-4.png (36.7 KB) ModFilelistAttack-4.png Administrator Admin, 2008-01-17 13:44

Related issues 1 (0 open1 closed)

Is duplicate of TYPO3 Core - Feature #16497: more secure [fileDenyPattern]Closed2006-08-26

Actions
Actions

Also available in: Atom PDF