CVE-2024-34358

5.3 MEDIUM

📋 TL;DR

This vulnerability in TYPO3's ShowImageController allows attackers to trigger unlimited thumbnail generation by manipulating the 'frame' parameter without proper HMAC validation. It affects TYPO3 installations from version 9.0.0 up to specific patched versions. Attackers can cause resource exhaustion through server-side image processing.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: 9.0.0 to 9.5.47 ELTS, 10.4.44 ELTS, 11.5.36 LTS, 12.4.14 LTS, 13.0.0 to 13.1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the eID 'tx_cms_showpic' endpoint to be accessible. All TYPO3 installations within affected version ranges are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Denial of service through server resource exhaustion (CPU, memory, disk space) from unlimited thumbnail generation, potentially disrupting website availability.

🟠

Likely Case

Increased server load and performance degradation from automated thumbnail generation attacks, leading to slower response times.

🟢

If Mitigated

Minimal impact with proper rate limiting, monitoring, and resource constraints in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests with manipulated parameters. No authentication needed. Simple automated tools could exploit this.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, 13.1.1

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2024-010

Restart Required: No

Instructions:

1. Identify your TYPO3 version. 2. Update to the patched version for your branch. 3. Clear TYPO3 caches after update. 4. Verify the fix by checking version.

🔧 Temporary Workarounds

Block eID endpoint

all

Restrict access to the vulnerable eID endpoint via web server configuration or firewall rules.

# Apache: RewriteRule ^/index\.php\?eID=tx_cms_showpic - [F]
# Nginx: location ~* "eID=tx_cms_showpic" { return 403; }

Implement rate limiting

all

Configure rate limiting on thumbnail generation endpoints to prevent abuse.

# Using mod_evasive (Apache) or similar modules
# Configure based on your web server's capabilities

🧯 If You Can't Patch

  • Implement strict rate limiting on all eID endpoints
  • Monitor server resources and set alerts for abnormal thumbnail generation patterns

🔍 How to Verify

Check if Vulnerable:

Check if your TYPO3 version falls within affected ranges and test if /index.php?eID=tx_cms_showpic endpoint is accessible.

Check Version:

Check TYPO3 backend under 'Admin Tools > System > Environment' or examine typo3conf/LocalConfiguration.php for version

Verify Fix Applied:

After patching, verify version is updated to patched version and test that frame parameter manipulation no longer triggers unlimited thumbnails.

📡 Detection & Monitoring

Log Indicators:

  • Unusual frequency of requests to /index.php?eID=tx_cms_showpic
  • Multiple thumbnail generation entries in TYPO3 or web server logs
  • High resource usage from PHP/image processing

Network Indicators:

  • HTTP requests with manipulated 'frame' parameter values
  • Repeated requests to same eID endpoint with varying parameters

SIEM Query:

source="web_server_logs" AND uri="*eID=tx_cms_showpic*" | stats count by src_ip

🔗 References

📤 Share & Export