CVE-2024-55892

4.8 MEDIUM

📋 TL;DR

This vulnerability in TYPO3's URI parsing component allows attackers to bypass host validation checks when processing externally provided URLs. This can lead to open redirect attacks (redirecting users to malicious sites) or server-side request forgery (SSRF) attacks (making the server send requests to internal systems). All TYPO3 installations using affected versions with URL parsing functionality are vulnerable.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: All versions before 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 LTS, 12.4.25 LTS, 13.4.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using TYPO3\CMS\Core\Http\Uri to parse externally provided URLs with host validation checks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

SSRF attacks could allow attackers to access internal services, exfiltrate sensitive data, or perform internal network reconnaissance. Open redirects could facilitate phishing campaigns by redirecting legitimate users to malicious sites.

🟠

Likely Case

Open redirect attacks where attackers trick users into visiting malicious websites through legitimate-looking TYPO3 redirects. Limited SSRF against accessible internal services.

🟢

If Mitigated

If proper input validation and URL sanitization are implemented beyond the vulnerable component, impact is minimal.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the application to parse user-provided URLs and use them after validation. No authentication required if vulnerable endpoint is exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 LTS, 12.4.25 LTS, 13.4.3

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2025-002

Restart Required: No

Instructions:

1. Identify your TYPO3 version. 2. Update to the patched version for your release line. 3. Clear all caches after update. 4. Test URL parsing functionality.

🔧 Temporary Workarounds

No workarounds available

all

The vendor advisory states there are no known workarounds for this vulnerability.

🧯 If You Can't Patch

  • Implement additional URL validation and sanitization in application code before using parsed URLs
  • Restrict access to URL parsing endpoints using web application firewalls or network controls

🔍 How to Verify

Check if Vulnerable:

Check if your TYPO3 installation uses TYPO3\CMS\Core\Http\Uri to parse user-provided URLs and validates hostnames. Review code for URL parsing patterns.

Check Version:

Check TYPO3 backend under Admin Tools > System > Environment or run: php typo3/sysext/core/bin/typo3 --version

Verify Fix Applied:

Verify TYPO3 version is updated to patched version and test URL parsing functionality with malicious URLs to ensure proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in access logs
  • Requests to internal IP addresses from TYPO3 server
  • Multiple failed URL validation attempts

Network Indicators:

  • TYPO3 server making unexpected outbound HTTP requests
  • Redirects to external domains from TYPO3 endpoints

SIEM Query:

source="typo3_access.log" AND (url="*redirect*" OR url="*http://*" OR url="*https://*") AND status=302

🔗 References

📤 Share & Export