CVE-2024-22188

7.2 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in TYPO3's Install Tool that allows authenticated admin users with system maintainer privileges to execute arbitrary shell commands with web server privileges. The vulnerability affects TYPO3 versions before the patched releases. Attackers can gain remote code execution on affected systems.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: All versions before 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, and 13.0.1
Operating Systems: All operating systems running TYPO3
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin user with system maintainer privileges. Install Tool must be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attackers to execute arbitrary commands, access sensitive data, install malware, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Authenticated attackers with admin privileges gain remote code execution, potentially leading to data theft, website defacement, or further system compromise.

🟢

If Mitigated

With proper access controls limiting admin privileges and network segmentation, impact is contained to the web application layer.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once authenticated. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, or 13.0.1 depending on your version

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2024-002

Restart Required: No

Instructions:

1. Identify your TYPO3 version. 2. Upgrade to the appropriate patched version for your release line. 3. Clear TYPO3 caches after upgrade. 4. Verify the Install Tool no longer accepts malicious input.

🔧 Temporary Workarounds

Disable Install Tool Access

linux

Restrict access to the Install Tool by removing or password-protecting the /typo3/install.php file

mv /path/to/typo3/install.php /path/to/typo3/install.php.disabled
chmod 000 /path/to/typo3/install.php

Restrict Admin Privileges

all

Review and limit system maintainer privileges to only essential users

🧯 If You Can't Patch

  • Restrict network access to TYPO3 admin interface using firewall rules
  • Implement web application firewall (WAF) rules to block command injection patterns

🔍 How to Verify

Check if Vulnerable:

Check TYPO3 version in Admin Panel or via composer show typo3/cms-core

Check Version:

composer show typo3/cms-core | grep version

Verify Fix Applied:

Verify version is 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, or 13.0.1 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual shell command execution in web server logs
  • Multiple failed login attempts to admin interface followed by Install Tool access
  • Suspicious POST requests to /typo3/install.php with shell metacharacters

Network Indicators:

  • Unusual outbound connections from web server to command & control servers
  • Unexpected process spawning from web server user

SIEM Query:

source="web_logs" AND uri="/typo3/install.php" AND (method="POST" OR params CONTAINS "|" OR params CONTAINS ";" OR params CONTAINS "`" OR params CONTAINS "$")

🔗 References

📤 Share & Export