[TYPO3-announce] TYPO3 Security Bulletin TYPO3-20080505-2: Cross Site Scripting vulnerability in extension powermail

Henning Pingel henning at typo3.org
Mon May 5 07:22:03 CEST 2008


Dear users of TYPO3,

It has been discovered that the extension powermail is susceptible to
Cross Site Scripting (XSS) attacks.

==== Component Type ====
Third party extension. This extension is not part of the TYPO3 default
installation.

==== Affected Versions ====
Version 1.1.9 and all versions below

==== Vulnerability Type ====
Cross Site Scripting

==== Severity ====
Medium

==== Problem Description ====
Failing to filter user input the extension is susceptible to Cross Site
Scripting (XSS), making it possible to execute arbitrary JavaScript.

==== Solution ====
An updated version is available from the TYPO3 extension manager and at
http://typo3.org/extensions/repository/view/powermail/1.1.10/

==== General advice ====
Follow the recommendations that are given in the TYPO3 Security Cookbook
[1]. If you haven't subscribed to the typo3-announce mailing list [2]
yet, please do so to receive future Security Bulletins via E-mail. All
TYPO3 security bulletins are available at the security team pages on
typo3.org [3].

==== Credits  ====
Credits go to security team member Marcus Krause, who discovered the
issue. Furthermore the TYPO3 Security Team wishes to thank the authors
Alexander Kellner and Mischa Heissmann. After being informed by the
TYPO3 Security Team about the presence of a security issue, they have
fixed the issue quickly.

Regards,
Henning Pingel
henning at typo3.org

[1]
<http://typo3.org/fileadmin/security-team/typo3_security_cookbook_v-0.5.pdf>
[2] <http://lists.netfielders.de/cgi-bin/mailman/listinfo/typo3-announce>
[3] <http://typo3.org/teams/security/security-bulletins/>









More information about the TYPO3-announce mailing list