An issue was discovered in the pixxio (aka pixx.io integration or DAM) extension before 1.0.6 for TYPO3. The extension fails to restrict the image download to the configured pixx.io DAM URL, resulting in SSRF. As a result, an attacker can download various content from a remote location and save it to a user-controlled filename, which may result in Remote Code Execution. A TYPO3 backend user account is required to exploit this.
References
Link | Resource |
---|---|
https://typo3.org/security/advisory/typo3-ext-sa-2021-017 | Patch Third Party Advisory |
https://typo3.org/security/advisory/typo3-ext-sa-2021-017 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://typo3.org/security/advisory/typo3-ext-sa-2021-017 - Patch, Third Party Advisory |
Information
Published : 2021-11-10 15:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43562
Mitre link : CVE-2021-43562
CVE.ORG link : CVE-2021-43562
JSON object : View
Products Affected
pixxio
- pixx.io
CWE
CWE-918
Server-Side Request Forgery (SSRF)