CVE-2021-43562

An issue was discovered in the pixxio (aka pixx.io integration or DAM) extension before 1.0.6 for TYPO3. The extension fails to restrict the image download to the configured pixx.io DAM URL, resulting in SSRF. As a result, an attacker can download various content from a remote location and save it to a user-controlled filename, which may result in Remote Code Execution. A TYPO3 backend user account is required to exploit this.
References
Link Resource
https://typo3.org/security/advisory/typo3-ext-sa-2021-017 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:pixxio:pixx.io:*:*:*:*:*:typo3:*:*

History

16 Nov 2021, 14:59

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
CPE cpe:2.3:a:pixxio:pixx.io:*:*:*:*:*:typo3:*:*
References (MISC) https://typo3.org/security/advisory/typo3-ext-sa-2021-017 - (MISC) https://typo3.org/security/advisory/typo3-ext-sa-2021-017 - Patch, Third Party Advisory
CWE CWE-918

10 Nov 2021, 15:58

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-10 15:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-43562

Mitre link : CVE-2021-43562

CVE.ORG link : CVE-2021-43562


JSON object : View

Products Affected

pixxio

  • pixx.io
CWE
CWE-918

Server-Side Request Forgery (SSRF)