[TYPO3-announce] TYPO3 Security Bulletin TYPO3-20080527-2: SQL Injection in extension "Library for Frontend plugins" (sg_zfelib)
henning at typo3.org
Tue May 27 08:16:09 CEST 2008
Dear users of TYPO3,
It has been discovered that the extension "Library for Frontend plugins"
(sg_zfelib) is susceptible to SQL Injections.
==== Component Type ====
Third party extension. This extension is not part of the TYPO3 default
==== Affected Versions ====
Version 1.1.512 and below
==== Vulnerability Type ====
==== Severity ====
==== Problem Description ====
Failing to filter user input the extension is susceptible to SQL
Injections making it possible to get read access to the database.
==== Solution ====
An updated version 1.1.513 is available from the TYPO3 extension manager
and at <http://typo3.org/extensions/repository/view/sg_zfelib/1.1.513/>.
Users of the extension are advised to update the extension as soon as
==== Additional Note ====
As the mentioned extension is a library which provides functionality for
other extensions, all extensions that depend on sg_zfelib (version
1.1.512 and below) will inherit the vulnerability of sg_zfelib.
Extensions based on sg_zfelib are for example: sg_newsplus, sg_address,
sg_avmedia, sg_event, sg_genealogy, sg_glossary, sg_newsletter,
sg_prodprom, sg_smallads, sg_userdata, sg_filelist, sg_dictionary.
This is not a complete list. More extensions using sg_zfelib may exist
that are for example not listed on TER.
==== General Advice ====
Follow the recommendations that are given in the TYPO3 Security Cookbook
. If you haven't subscribed to the typo3-announce mailing list 
yet, please do so to receive future Security Bulletins via E-mail. All
TYPO3 Security Bulletins are available at the Security Team pages on
==== Credits ====
Credits go to Philipp Rocholl and Wassim Amouri, who discovered and
reported the issues. Furthermore the TYPO3 Security Team wishes to thank
the extension author Stefan Geith for fixing the extension.
henning at typo3.org
More information about the TYPO3-announce