It has been discovered that the extension "Direct Mail" (direct_mail) is susceptible to Configuration Injection.

Problem Description

The “Configuration” backend module of the extension allows an authenticated user to write arbitrary page TSConfig for folders configured as “Direct Mail”. Exploiting the vulnerability may lead to Configuration Injection (TYPO3 10.4 and above) and to Arbitrary Code Execution (TYPO3 9.5 and below).

A valid backend user account having access to the Direct Mail "Configuration" backend  module is needed in order to exploit this vulnerability.

Note: Users of the extension should manually check if a suspicious page TSConfig has been written to all folders configured as “Direct Mail”.

Solution

Updated versions 6.0.3, 7.0.3 and 9.5.2 are  available from the TYPO3 extension manager, packagist and at  

https://extensions.typo3.org/extension/download/direct_mail/6.0.3/zip

https://extensions.typo3.org/extension/download/direct_mail/7.0.3/zip

https://extensions.typo3.org/extension/download/direct_mail/9.5.2/zip

Users of the extension are advised to update the extension as soon as possible.

Credits

Thanks to Christoph Lehmann for reporting the vulnerability and to Ivan Kartolo for providing updated versions of the extension.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.