CVE-2024-55945

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in TYPO3's backend user interface allows attackers to trick authenticated backend users into performing unauthorized state-changing actions via malicious links. The vulnerability specifically affects the DB Check Module component. Only TYPO3 installations with specific misconfigurations are vulnerable.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: All versions before 11.5.42 ELTS
Operating Systems: All operating systems running TYPO3
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when both: 1) security.backend.enforceReferrer is disabled, 2) BE/cookieSameSite is set to 'lax' or 'none'

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate database content, potentially altering or deleting critical data through unauthorized administrative actions.

🟠

Likely Case

Attackers could perform limited data manipulation in the database through the DB Check Module functionality.

🟢

If Mitigated

With proper security configurations enabled, the vulnerability cannot be exploited even if users click malicious links.

🌐 Internet-Facing: MEDIUM - Requires specific misconfigurations and user interaction, but backend interfaces are often internet-accessible.
🏢 Internal Only: LOW - Requires user interaction with malicious content, which is less likely in controlled internal environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated victim, specific misconfigurations, and user interaction with malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: TYPO3 11.5.42 ELTS

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2025-010

Restart Required: No

Instructions:

1. Backup your TYPO3 installation and database. 2. Update to TYPO3 version 11.5.42 ELTS using the TYPO3 Install Tool or Composer. 3. Clear all caches through the TYPO3 backend. 4. Verify the update was successful.

🔧 Temporary Workarounds

Enable Referrer Enforcement

all

Enable the security.backend.enforceReferrer feature to prevent CSRF attacks

Set $GLOBALS['TYPO3_CONF_VARS']['BE']['enforceReferrer'] = true; in LocalConfiguration.php

Configure Secure Cookie Settings

all

Set BE/cookieSameSite to 'strict' instead of 'lax' or 'none'

Set $GLOBALS['TYPO3_CONF_VARS']['BE']['cookieSameSite'] = 'strict'; in LocalConfiguration.php

🧯 If You Can't Patch

  • Implement both workarounds: enable enforceReferrer and set cookieSameSite to 'strict'
  • Restrict backend access to trusted networks only using firewall rules

🔍 How to Verify

Check if Vulnerable:

Check TYPO3 version in Install Tool or via command: php typo3/sysext/core/bin/typo3 --version

Check Version:

php typo3/sysext/core/bin/typo3 --version

Verify Fix Applied:

Confirm version is 11.5.42 ELTS or higher and verify both security configurations are properly set

📡 Detection & Monitoring

Log Indicators:

  • Unusual DB Check Module activity from unexpected IP addresses
  • Multiple failed CSRF token validations in backend logs

Network Indicators:

  • HTTP GET requests to backend DB Check endpoints with state-changing parameters

SIEM Query:

source="typo3.log" AND ("DB Check" OR "csrf" OR "referrer") AND (severity="WARNING" OR severity="ERROR")

🔗 References

📤 Share & Export