[TYPO3-announce] TYPO3 Security Bulletin TYPO3-20080505-1: Multiple vulnerabilities in extension MailformPlus (th_mailformplus)

Henning Pingel henning at typo3.org
Mon May 5 07:20:39 CEST 2008

Dear users of TYPO3,

It has been discovered that the extension MailformPlus (th_mailformplus)
is susceptible to Cross Site Scripting (XSS) attacks and allows Remote
Code Execution.

==== Component Type ====
Third party extension. This extension is not part of the TYPO3 default

==== Affected Versions ====
Version 4.0.3 and below

==== Vulnerability Type ====
Cross Site Scripting, Remote Code Execution

==== Severity ====

==== Problem Description ====
Failing to filter user input the extension is susceptible to Cross Site
Scripting (XSS) making it possible to execute arbitrary JavaScript. When
using upload forms with this extension, it is possible to execute
arbitrary PHP script code due to insufficient file filtering.

==== Solution ====
An updated version is available from the TYPO3 extension manager and at

At the time of writing, the most recent version of MailformPlus is
version 4.0.7 which is available at

==== General advice ====
Follow the recommendations that are given in the TYPO3 Security Cookbook
[1]. If you haven't subscribed to the typo3-announce mailing list [2]
yet, please do so to receive future Security Bulletins via E-mail. All
TYPO3 security bulletins are available at the security team pages on
typo3.org [3].

==== Credits  ====
Credits go to security team member Marcus Krause, who discovered the
issue. Furthermore the TYPO3 Security Team wishes to thank the guys at
Typoheads GmbH. After being informed by the TYPO3 Security Team about
the presence of security issues, they have fixed the issues quickly.

Henning Pingel
henning at typo3.org

[2] <http://lists.netfielders.de/cgi-bin/mailman/listinfo/typo3-announce>
[3] <http://typo3.org/teams/security/security-bulletins/>

More information about the TYPO3-announce mailing list