[TYPO3-UG Russia] Fwd: [TYPO3-announce] TYPO3 Security Bulletin TYPO3-20080513-1: Multiple vulnerabilities in extension WT Gallery (wt_gallery)

Michael Shigorin mike at osdn.org.ua
Tue May 13 12:26:04 CEST 2008


----- Forwarded message from Henning Pingel <henning/typo3.org> -----

Date: Tue, 13 May 2008 08:27:01 +0200
From: Henning Pingel <henning/typo3.org>
To: typo3-announce/lists.netfielders.de
Subject: [TYPO3-announce] TYPO3 Security Bulletin TYPO3-20080513-1: Multiple vulnerabilities in extension WT Gallery (wt_gallery)

Dear users of TYPO3,

It has been discovered that the extension wt_gallery is susceptible to
Path Traversal and Cross Site Scripting (XSS) attacks. Besides that, it
may disclose sensitive information.

==== Component Type ====
Third party extension. This extension is not part of the TYPO3 default
installation.

==== Affected Versions ====
Version 2.6.2 and below (Cross Site Scripting), Version 2.5.0 and below
(Path Traversal, Information Disclosure, Cross Site Scripting).

==== Vulnerability Type ====
Path Traversal and Information Disclosure, Cross Site Scripting

==== Severity ====
High

==== Problem Description ====
A problem has been discovered in the wt_gallery extension, which allows
a user to download arbitrary image-files from and may disclose the
directory structure of the server. Cross Site Scripting is also possible
by injecting HTML or JavaScript code because the extension fails to
properly sanitize user-supplied input.

==== Solution ====
A fixed version 2.6.3 is available in the extension repository and at
http://typo3.org/extensions/repository/view/wt_gallery/2.6.3/. Users of
the extension wt_gallery are advised to update the extension as soon as
possible.

==== General advice ====
Follow the recommendations that are given in the TYPO3 Security Cookbook
[1]. If you haven't subscribed to the typo3-announce mailing list [2]
yet, please do so to receive future Security Bulletins via E-mail. All
TYPO3 security bulletins are available at the security team pages on
typo3.org [3].

==== Credits ====
Credits go to security team members Helmut Hummel and Henning Pingel,
who discovered the issues. Furthermore the TYPO3 Security Team wishes to
thank the extension author Alexander Kellner for fixing the issue.

Regards,
Henning Pingel
henning/typo3.org

[1]
<http://typo3.org/fileadmin/security-team/typo3_security_cookbook_v-0.5.pdf>
[2] <http://lists.netfielders.de/cgi-bin/mailman/listinfo/typo3-announce>
[3] <http://typo3.org/teams/security/security-bulletins/>

_______________________________________________
TYPO3-announce mailing list
TYPO3-announce/lists.netfielders.de
http://lists.netfielders.de/cgi-bin/mailman/listinfo/typo3-announce

----- End forwarded message -----

-- 
 ---- WBR, Michael Shigorin <mike at altlinux.ru>
  ------ Linux.Kiev http://www.linux.kiev.ua/


More information about the TYPO3-russia mailing list