CVE-2020-15099
Description
In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.20, and greater than or equal to 10.0.0 and less than 10.4.6, in a case where an attacker manages to generate a valid cryptographic message authentication code (HMAC-SHA1) - either by using a different existing vulnerability or in case the internal encryptionKey was exposed - it is possible to retrieve arbitrary files of a TYPO3 installation. This includes the possibility to fetch typo3conf/LocalConfiguration.php, which again contains the encryptionKey as well as credentials of the database management system being used. In case a database server is directly accessible either via internet or in a shared hosting network, this allows the ability to completely retrieve, manipulate or delete database contents. This includes creating an administration user account - which can be used to trigger remote code execution by injecting custom extensions. This has been patched in versions 9.5.20 and 10.4.6.
CWE
- CWE-200 — CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-20 — CWE-20: Improper Input Validation
Affected
- TYPO3 / TYPO3 CMS — v=>= 9.0.0, < 9.5.20 [affected]; v=>= 10.0.0, 10.4.6 [affected]
CVSS
- 3.1 score=8.1 severity=HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
References
- https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3x94-fv5h-5q2c x_refsource_CONFIRM
- https://typo3.org/security/advisory/typo3-core-sa-2020-007 x_refsource_MISC
Source
cvelistV5-main/cves/2020/15xxx/CVE-2020-15099.json