CVE-2024-38874

5.4 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to manipulate events in TYPO3 websites using the events2 extension. Attackers can activate or delete events without proper authorization. This affects TYPO3 installations with vulnerable versions of the events2 extension.

💻 Affected Systems

Products:
  • TYPO3 events2 extension
Versions: Events2 extension versions before 8.3.8 and 9.x before 9.0.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects TYPO3 installations with the vulnerable events2 extension installed and enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete or modify all events on the website, causing data loss and disrupting event management functionality.

🟠

Likely Case

Attackers tamper with event listings, causing confusion, data integrity issues, and potential reputational damage.

🟢

If Mitigated

With proper access controls and patching, the vulnerability is eliminated and event management remains secure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has simple exploitation vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Events2 extension 8.3.8 or 9.0.6

Vendor Advisory: https://typo3.org/security/advisory/typo3-ext-sa-2024-003

Restart Required: No

Instructions:

1. Update the events2 extension to version 8.3.8 or 9.0.6 via TYPO3 Extension Manager. 2. Clear TYPO3 caches. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable events2 extension

all

Temporarily disable the vulnerable extension until patching is possible

typo3cms extension:deactivate events2

Restrict access to management plugin

all

Use web server rules to restrict access to vulnerable endpoints

# Add appropriate .htaccess or nginx rules to block /typo3conf/ext/events2/ paths

🧯 If You Can't Patch

  • Implement web application firewall rules to block suspicious requests to events2 endpoints
  • Enable detailed logging for events2 plugin access and monitor for unauthorized activity

🔍 How to Verify

Check if Vulnerable:

Check the events2 extension version in TYPO3 Extension Manager or typo3conf/ext/events2/ext_emconf.php

Check Version:

grep 'version' typo3conf/ext/events2/ext_emconf.php

Verify Fix Applied:

Confirm events2 extension version is 8.3.8 or higher (for 8.x) or 9.0.6 or higher (for 9.x)

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated POST/PUT/DELETE requests to events2 management endpoints
  • Unexpected event activation/deletion in application logs

Network Indicators:

  • HTTP requests to /typo3conf/ext/events2/Controller/ManagementController.php without authentication

SIEM Query:

source="web_access_logs" AND (uri_path="/typo3conf/ext/events2/" OR uri_path="/events2/") AND (http_method="POST" OR http_method="PUT" OR http_method="DELETE") AND NOT user_agent="TYPO3"

🔗 References

📤 Share & Export