CVE-2017-7581

9.8 CRITICAL

📋 TL;DR

This is an unauthenticated SQL injection vulnerability in TYPO3's News module that allows attackers to execute arbitrary SQL commands. It affects TYPO3 installations using the News module version 5.3.2 or earlier. Attackers can potentially read, modify, or delete database content.

💻 Affected Systems

Products:
  • TYPO3 News Module
Versions: 5.3.2 and earlier
Operating Systems: All platforms running TYPO3
Default Config Vulnerable: ⚠️ Yes
Notes: Requires TYPO3 installation with News module enabled. The vulnerability is in the NewsController.php file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover via subsequent attacks.

🟠

Likely Case

Database information disclosure, including user credentials, sensitive content, and configuration data.

🟢

If Mitigated

Limited impact if database permissions are properly restricted and web application firewall blocks SQL injection patterns.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation makes internet-facing systems immediate targets.
🏢 Internal Only: MEDIUM - Internal systems still vulnerable but require network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available. Attackers can exploit via HTTP requests to vulnerable endpoints without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: News module 5.3.3 or later

Vendor Advisory: https://typo3.org/security/advisory/typo3-ext-sa-2017-006/

Restart Required: No

Instructions:

1. Update TYPO3 News module to version 5.3.3 or later. 2. Clear TYPO3 cache. 3. Verify the patch is applied by checking module version.

🔧 Temporary Workarounds

Disable News Module

all

Temporarily disable the vulnerable News module if immediate patching isn't possible.

# In TYPO3 Extension Manager, disable 'news' extension

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns targeting the News module.

# Configure WAF to block requests containing SQL injection patterns to NewsController.php endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable TYPO3 instances
  • Deploy database monitoring to detect unusual SQL queries from the web application

🔍 How to Verify

Check if Vulnerable:

Check if News module version is 5.3.2 or earlier in TYPO3 Extension Manager or by examining ext_emconf.php in the news extension directory.

Check Version:

grep -r 'version' typo3conf/ext/news/ext_emconf.php | grep -o '[0-9]\+\.[0-9]\+\.[0-9]\+'

Verify Fix Applied:

Verify News module version is 5.3.3 or later. Test vulnerable endpoints with SQL injection payloads to confirm they're blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in web server logs
  • HTTP requests to NewsController.php with SQL keywords in parameters
  • Multiple failed login attempts following SQL injection attempts

Network Indicators:

  • HTTP POST/GET requests containing SQL injection patterns to news-related endpoints
  • Unusual database connections from web server IP

SIEM Query:

source="web_logs" AND (uri="*NewsController*" AND (param="*order*" OR param="*OrderByAllowed*") AND (param="*SELECT*" OR param="*UNION*" OR param="*OR 1=1*"))

🔗 References

📤 Share & Export