CVE-2024-34356

5.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in TYPO3's form manager backend module. It allows authenticated backend users with form module access to inject malicious scripts that could steal session cookies or perform unauthorized actions. Only TYPO3 installations with vulnerable versions and authenticated backend users are affected.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: TYPO3 versions 9.0.0 through 9.5.47, 10.0.0 through 10.4.44, 11.0.0 through 11.5.36, 12.0.0 through 12.4.14, and 13.0.0 through 13.1.0
Operating Systems: All operating systems running TYPO3
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where backend users have access to the form manager module. ELTS (Extended Long Term Support) versions 9.5.48 and 10.4.45, and LTS versions 11.5.37, 12.4.15, and 13.1.1 are patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious backend user could steal administrator session cookies, escalate privileges, or perform unauthorized administrative actions within the TYPO3 backend.

🟠

Likely Case

Authenticated users with form module access could inject scripts that affect other backend users viewing the same form manager interface, potentially stealing their session data.

🟢

If Mitigated

With proper access controls limiting form module access to trusted users only, the impact is minimal as exploitation requires authenticated backend access.

🌐 Internet-Facing: LOW - Exploitation requires authenticated backend access, which should not be internet-facing in properly configured deployments.
🏢 Internal Only: MEDIUM - Internal users with backend access could exploit this, but requires specific module permissions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid backend user account with access to the form manager module. The vulnerability is in the backend interface, not the frontend.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: TYPO3 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, or 13.1.1

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2024-008

Restart Required: No

Instructions:

1. Identify your TYPO3 version. 2. Upgrade to the patched version for your branch: 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, or 13.1.1. 3. Apply the upgrade using TYPO3's standard update procedures. 4. Clear all caches after upgrade.

🔧 Temporary Workarounds

Restrict Form Manager Access

all

Limit backend user access to the form manager module to only trusted administrators who absolutely need it.

Navigate to TYPO3 backend > Admin Tools > Access > Backend Users > Edit user > Modules tab > Uncheck 'Form' module

Apply Security Patch Manually

all

Apply the specific commits that fix the XSS vulnerability without full version upgrade.

Apply GitHub commits: 2832e2f51f929aeddb5de7d667538a33ceda8156, d0393a879a32fb4e3569acad6bdb5cda776be1e5, e95a1224719efafb9cab2d85964f240fd0356e64

🧯 If You Can't Patch

  • Restrict backend user permissions to minimize who can access the form manager module
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check TYPO3 version in backend dashboard or via composer show typo3/cms-core. If version is between affected ranges and form manager is accessible, system is vulnerable.

Check Version:

composer show typo3/cms-core | grep version

Verify Fix Applied:

After upgrade, verify version is 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, or 13.1.1. Test form manager functionality works without XSS issues.

📡 Detection & Monitoring

Log Indicators:

  • Unusual form manager activity from non-admin users
  • Multiple failed login attempts followed by form manager access

Network Indicators:

  • Suspicious JavaScript payloads in form-related backend requests

SIEM Query:

source="typo3" AND ("form manager" OR "formmodule") AND ("script" OR "javascript" OR "onload" OR "onerror")

🔗 References

📤 Share & Export