[TYPO3-announce] TYPO3 Security Bulletin TYPO3-20080527-1: Cross Site Scripting vulnerability in extension "KJ: Image Lightbox v2" (kj_imagelightbox2)

Henning Pingel henning at typo3.org
Tue May 27 07:23:37 CEST 2008

Dear users of TYPO3,

It has been discovered that the extension "KJ: Image Lightbox v2"
(kj_imagelightbox2) is susceptible to Cross Site Scripting (XSS) attacks.

==== Component Type ====
Third party extension. This extension is not part of the TYPO3 default

==== Affected Versions ====
Version 1.4.2 and below, possibly also all versions of obsolete
predecessor extension kj_imagelightbox

==== Vulnerability Type ====
Cross Site Scripting

==== Severity ====

==== Problem Description ====
Failing to filter user input the extension is susceptible to Cross Site
Scripting (XSS) making it possible to execute arbitrary JavaScript.

==== Solution ====
An updated version 1.4.3 is available from the TYPO3 extension manager
and at
Users of the extension are advised to update the extension as soon as

Users of the extension kj_imagelightbox, which is the predecessor of
kj_imagelightbox2, should switch to kj_imagelightbox2 1.4.3 too. The
predecessor might contain the same security issue, but is no longer part
of TER because the extension author decided to not maintain it any longer.

==== General advice ====
Follow the recommendations that are given in the TYPO3 Security Cookbook
[1]. If you haven't subscribed to the typo3-announce mailing list [2]
yet, please do so to receive future Security Bulletins via E-mail. All
TYPO3 Security Bulletins are available at the Security Team pages on
typo3.org [3].

==== Credits ====
Credits go to Michael Raberger, who discovered the issues. Furthermore
the TYPO3 Security Team wishes to thank the extension author Julian
Kleinhans for fixing the issue.

Henning Pingel
henning at typo3.org

[2] <http://lists.netfielders.de/cgi-bin/mailman/listinfo/typo3-announce>
[3] <http://typo3.org/teams/security/security-bulletins/>

More information about the TYPO3-announce mailing list