Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p4xx-m758-3hpx

Опубликовано: 20 мая 2025
Источник: github
Github: Прошло ревью
CVSS3: 3.3

Описание

TYPO3 CMS Webhooks Server Side Request Forgery

Problem

Webhooks are inherently vulnerable to Server-Side Request Forgery (SSRF), which can be exploited by adversaries to target internal resources (e.g., localhost or other services on the local network). While this is not a vulnerability in TYPO3 itself, it may enable attackers to blindly access systems that would otherwise be inaccessible. An administrator-level backend user account is required to exploit this vulnerability.

Solution

Update to TYPO3 versions 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

[!IMPORTANT]

Manual actions required

To mitigate potential SSRF risks via webhooks, it is recommended to explicitly allow access only to trusted hosts. This can be achieved by configuring the allowlist in $GLOBALS['TYPO3_CONF_VARS']['HTTP']['allowed_hosts']['webhooks'].

If the allowlist is not defined or set to null, all requests will be allowed. If the allowlist is an empty array, all requests will be blocked.

By default, the factory setting allows all requests. This prevents existing webhooks from failing after upgrading to the affected TYPO3 versions. Administrators must configure this setting manually to enforce restrictions.

Credits

Thanks to the National Cyber Security Center (NCSC) of Switzerland for reporting this issue, and to TYPO3 core & security team member Benjamin Franzke for fixing it.

Пакеты

Наименование

typo3/cms-webhooks

composer
Затронутые версииВерсия исправления

>= 12.0.0, <= 12.4.30

12.4.31

Наименование

typo3/cms-webhooks

composer
Затронутые версииВерсия исправления

>= 13.0.0, <= 13.4.11

13.4.12

EPSS

Процентиль: 13%
0.00043
Низкий

3.3 Low

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 3.3
nvd
9 месяцев назад

TYPO3 is an open source, PHP based web content management system. In versions on the 12.x branch prior to 12.4.31 LTS and the 13.x branch prior to 13.4.2 LTS, Webhooks are inherently vulnerable to Cross-Site Request Forgery (CSRF), which can be exploited by adversaries to target internal resources (e.g., localhost or other services on the local network). While this is not a vulnerability in TYPO3 itself, it may enable attackers to blindly access systems that would otherwise be inaccessible. An administrator-level backend user account is required to exploit this vulnerability. Users should update to TYPO3 version 12.4.31 LTS or 13.4.12 LTS to fix the problem.

CVSS3: 3.3
fstec
9 месяцев назад

Уязвимость расширения Webhooks системы управления контентом TYPO3, позволяющая нарушителю осуществить SSRF-атаку

EPSS

Процентиль: 13%
0.00043
Низкий

3.3 Low

CVSS3

Дефекты

CWE-918