Skip to content
Snippets Groups Projects
  1. Mar 16, 2021
    • Frank Naegler's avatar
      [SECURITY] Add cache for error page handling · d339f493
      Frank Naegler authored
      To prevent DoS attacks by using page-based error handling, the
      content of the error page is now cached, this prevents fetching
      the content of the error pages again and again.
      
      Resolves: #88824
      Releases: master, 11.1, 10.4, 9.5
      Change-Id: I6dea5200dc710a182b66deedfbeb2110ea829117
      Security-Bulletin: TYPO3-CORE-SA-2021-005
      Security-References: CVE-2021-21359
      Reviewed-on: https://review.typo3.org/c/Packages/TYPO3.CMS/+/68438
      
      
      Tested-by: default avatarOliver Hader <oliver.hader@typo3.org>
      Reviewed-by: default avatarOliver Hader <oliver.hader@typo3.org>
      d339f493
    • Andreas Fernandez's avatar
      [SECURITY] XSS in form creation wizard · 1bd00950
      Andreas Fernandez authored
      The form name is rendered multiple times in the form wizard when either
      creating or cloning a form. Any input is now sanitized to avoid XSS
      in the summary step of the form wizard.
      
      Resolves: #93560
      Releases: master, 11.1, 10.4
      Change-Id: I3ddce48e38e32456318c695774bbcd035115b5ae
      Security-Bulletin: TYPO3-CORE-SA-2021-004
      Security-References: CVE-2021-21358
      Reviewed-on: https://review.typo3.org/c/Packages/TYPO3.CMS/+/68437
      
      
      Tested-by: default avatarOliver Hader <oliver.hader@typo3.org>
      Reviewed-by: default avatarOliver Hader <oliver.hader@typo3.org>
      1bd00950
    • Ralf Zimmermann's avatar
      [SECURITY] Validate allowed values for form element editors · c44d9f5a
      Ralf Zimmermann authored
      Form editors which provide only a limited set of allowed values
      (like single-select or multi-select form editors) now validate the
      submitted values against the set of allowed values (configured within
      the form setup).
      
      Resolves: #93581
      Releases: master, 11.1, 10.4, 9.5
      Change-Id: Iae0a34c20cacdbcfc4eff9c4b1add966c1657010
      Security-Bulletin: TYPO3-CORE-SA-2021-003
      Security-References: CVE-2021-21357
      Reviewed-on: https://review.typo3.org/c/Packages/TYPO3.CMS/+/68436
      
      
      Tested-by: default avatarOliver Hader <oliver.hader@typo3.org>
      Reviewed-by: default avatarOliver Hader <oliver.hader@typo3.org>
      c44d9f5a
    • Oliver Hader's avatar
      [SECURITY] Mitigate directly accessible file upload in form framework · 57b5b68f
      Oliver Hader authored
      File handling implementation in `UploadedFileReferenceConverter` of
      `ext:form` creates files in `/fileadmin/user_uploads/` whenever some
      Extbase controller is (implicitly) dealing with `FileReference` models,
      unless particular implementations assign specific type converters or
      register type converters having a higher processing priority.
      
      As a side-effect this could lead to by-passing mime-type validators,
      allowing to plant cross-site scripting and other malicious binaries
      to public accessible `/fileadmin/` storage. PHP files and similar are
      blocked since `fileDenyPattern` rule is active in any case.
      
      This change makes the usage of `UploadedFileReferenceConverter` more
      specific in the scope of processing contact forms with `ext:form`
      
      * use random folder names for files, `.../form_abcde12345/image.png`
      * removes `UploadedFileReferenceConverter` from being used implicitly
        by other Extbase implementations dealing with `FileReference` models
      
      `PseudoFileReference` has been introduced to limit properties being
      serialized to `uid` (in case it's a real file reference) or `uidLocal`
      (in case it's a transient reference, pointing to a file).
      
      Direct URLs to uploaded files are substituted by `fileDump` eID script
      now, enforcing corresponding FAL mime-type and denying the web server
      from guessing/interpreting a different mime-type based on file suffix.
      
      A unique form `__session` value has been introduce, serving as seed
      to derive for instance mentioned folder names for uploaded files. In
      addition to that, form `__state` is only parsed when having been
      submitted via expected `FormFrontendController::performAction`.
      
      Resolves: #92136
      Releases: master, 11.1, 10.4, 9.5
      Change-Id: I7c33803443a68d6b3c895ec74da802a70bd390c1
      Security-Bulletin: TYPO3-CORE-SA-2021-002
      Security-References: CVE-2021-21355
      Reviewed-on: https://review.typo3.org/c/Packages/TYPO3.CMS/+/68435
      
      
      Tested-by: default avatarOliver Hader <oliver.hader@typo3.org>
      Reviewed-by: default avatarOliver Hader <oliver.hader@typo3.org>
      57b5b68f
    • Torben Hansen's avatar
      [SECURITY] Prevent urls starting with // to be used for redirects · 6f17455d
      Torben Hansen authored
      A missing check in GeneralUtility::sanitizeLocalUrl() resulted in
      an url starting with `//` to be considered as a local url.
      
      This change ensures, that urls starting with `//` are not considered
      local. Corresponding unit tests are fixed and extended, since they
      need a full environment to process correctly.
      
      Resolves: #92891
      Releases: master, 11.1, 10.4, 9.5
      Change-Id: I41eb16776742b3e0d2cffd064dd0408e4faa7c78
      Security-Bulletin: TYPO3-CORE-SA-2021-001
      Security-References: CVE-2021-21338
      Reviewed-on: https://review.typo3.org/c/Packages/TYPO3.CMS/+/68434
      
      
      Tested-by: default avatarOliver Hader <oliver.hader@typo3.org>
      Reviewed-by: default avatarOliver Hader <oliver.hader@typo3.org>
      6f17455d
  2. Mar 15, 2021
  3. Mar 14, 2021
  4. Mar 12, 2021
  5. Mar 11, 2021
  6. Mar 10, 2021