CVE-2021-43562

An issue was discovered in the pixxio (aka pixx.io integration or DAM) extension before 1.0.6 for TYPO3. The extension fails to restrict the image download to the configured pixx.io DAM URL, resulting in SSRF. As a result, an attacker can download various content from a remote location and save it to a user-controlled filename, which may result in Remote Code Execution. A TYPO3 backend user account is required to exploit this.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:pixxio:pixx.io:*:*:*:*:*:typo3:*:*

History

21 Nov 2024, 06:29

Type Values Removed Values Added
References () https://typo3.org/security/advisory/typo3-ext-sa-2021-017 - Patch, Third Party Advisory () https://typo3.org/security/advisory/typo3-ext-sa-2021-017 - Patch, Third Party Advisory

16 Nov 2021, 14:59

Type Values Removed Values Added
CPE cpe:2.3:a:pixxio:pixx.io:*:*:*:*:*:typo3:*:*
CWE CWE-918
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
References (MISC) https://typo3.org/security/advisory/typo3-ext-sa-2021-017 - (MISC) https://typo3.org/security/advisory/typo3-ext-sa-2021-017 - Patch, Third Party Advisory

10 Nov 2021, 15:58

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-10 15:15

Updated : 2024-11-21 06:29


NVD link : CVE-2021-43562

Mitre link : CVE-2021-43562

CVE.ORG link : CVE-2021-43562


JSON object : View

Products Affected

pixxio

  • pixx.io
CWE
CWE-918

Server-Side Request Forgery (SSRF)