CVE-2024-55924

8.0 HIGH

📋 TL;DR

This CSRF vulnerability in TYPO3's backend allows attackers to trick authenticated backend users into executing unauthorized actions via malicious links. When combined with specific misconfigurations, it can trigger pre-defined command classes in the Scheduler Module, potentially leading to data import/export. Only TYPO3 installations with active backend sessions and specific configuration weaknesses are affected.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: All versions before 11.5.42 ELTS
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Requires specific misconfigurations: security.backend.enforceReferrer disabled AND BE/cookieSameSite set to lax or none. Also requires user interaction with malicious link while authenticated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized import or export of sensitive data through the Scheduler Module's command classes, potentially leading to data exfiltration or system compromise.

🟠

Likely Case

Unauthorized backend actions being performed by tricked administrators, such as content modifications or configuration changes.

🟢

If Mitigated

No impact if proper referrer enforcement and cookie settings are configured, or if users don't interact with malicious links.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated users into clicking malicious links, plus specific configuration weaknesses.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: TYPO3 11.5.42 ELTS

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2025-009

Restart Required: No

Instructions:

1. Backup your TYPO3 installation and database. 2. Update to TYPO3 version 11.5.42 ELTS using the TYPO3 Extension Manager or manual update. 3. Clear all caches after update. 4. Verify the update was successful.

🔧 Temporary Workarounds

Configuration Hardening

all

Enable referrer enforcement and configure secure cookie settings to reduce attack surface.

Set $GLOBALS['TYPO3_CONF_VARS']['BE']['cookieSameSite'] = 'strict' in LocalConfiguration.php
Enable security.backend.enforceReferrer feature

🧯 If You Can't Patch

  • Enable security.backend.enforceReferrer feature and set BE/cookieSameSite to 'strict' in configuration
  • Implement strict access controls and monitoring for backend user activities, especially Scheduler Module usage

🔍 How to Verify

Check if Vulnerable:

Check TYPO3 version and configuration: version must be < 11.5.42 ELTS AND security.backend.enforceReferrer disabled AND BE/cookieSameSite set to lax or none.

Check Version:

php typo3/sysext/core/bin/typo3 --version

Verify Fix Applied:

Verify TYPO3 version is 11.5.42 ELTS or higher using the About Modules or version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Scheduler Module executions
  • Backend actions from unusual IPs or without proper referrer headers
  • CSRF token validation failures in backend logs

Network Indicators:

  • HTTP GET requests to backend endpoints that should only accept POST
  • Requests with missing or malformed referrer headers to backend

SIEM Query:

source="typo3.log" AND ("CSRF" OR "Scheduler" OR "deep link") AND (severity="WARNING" OR severity="ERROR")

🔗 References

📤 Share & Export