blog.Resource

Archive:

News-Feeds:


RSS 2.0
RSS 0.91
RDF
ATOM 0.3
November 17, 2010

TYPO3 4.5 will be the most secure TYPO3 version ever.

By: Helmut Hummel

The upcoming version 4.5 will include a form protection for improved security.

The TYPO3 Security Team strives to constantly improve every TYPO3 version not only by fixing security issues that were brought to our attention but also by introducing new security features. The possibility of storing salted passwords and RSA encrypted authentication introduced in TYPO3 version 4.3 are examples for such improvements. With the upcoming version 4.5 we will introduce a generic form protection API which will used throughout the editors view (backend) in the first place, but can also be extended to be used for website (frontend) plugins.

We'd like to explain what this protection is good for and why we (the Core Team and the Security Team) decided not to backport this feature to the current or older TYPO3 versions.

The Risk

The backend of current TYPO3 versions is susceptible to Cross Site Request Forgery (CSRF or XSRF) attacks. For such an attack to be successful several requirements must be fulfilled:

  1. An editor must be logged in
  2. The editor must click a malicious link received in an email or by visiting a malicious website
  3. The attacker must know the exact URL of the form that should be submitted on behalf of the logged in editor

If these preconditions are fulfilled every (TYPO3 editing) action the editor has the right to execute can be preformed without any further confirmation by the editor.

The Fix

As of the TYPO3 version 4.5 (almost) every action an authenticated editor can perform will be secured by a token (unguessable random string value) submitted in every request. This makes it impossible for an attacker to know (or guess) the exact request parameters and/ or URL for an action to be taken.

Mitigation

Like for any other (business) critical task you are doing over the wire we recommend the following for your TYPO3 editing or administrative tasks:

  1. Always log out after finishing TYPO3 tasks.
  2. Do not visit any other internet sites while being logged in
  3. Do not read emails / do not click on any link in an email while being logged in
  4. Do not use the systems standard browser to do TYPO3 tasks
  5. In General: Use an up to date (fully patched) TYPO3 version and no extension with a (known) vulnerability

If you respect this advice you will be safe in regard of this very attack with every TYPO3 version.

The Decision

We decided not to introduce a programmatic fix in the current TYPO3 version 4.4 or any other version below because with that we would have risked to break core functionality and we would have to break the functionality of (some) extensions within minor versions of TYPO3. 

Additionally CSRF attacks need quite some effort and knowledge of the attacked target and by following the above mentioned easy rules, the probability of a successful attack tends to zero. This is why we went for functionality and stability while still considering all TYPO3 versions below 4.5 to be secure (enough).

We're confident that you will understand and support this decision.


comments

No comments yet. Be the first to comment on this!

Sorry, comments are closed for this post.