[TYPO3-announce] TYPO3 Collective Security Bulletin TYPO3-20080619-1: Several vulnerabilities in third party extensions
Lars Houmark
lars at typo3.org
Thu Jun 19 07:32:22 CEST 2008
Dear users of TYPO3,
Multiple issues have been found in third party TYPO3 extensions.
This Collective Security Bulletin (CSB) is a listing of vulnerable
extensions with neither significant
download numbers nor other special importance amongst the TYPO3
Community. The intention of CSBs is to reduce the workload of the
TYPO3 Security Team and the authors or maintainers of the extensions
with the issues. Nethertheless, vulnerabilities in TYPO3 core or
important extensions will still get the well-known single Security
Bulletin each.
Please read an extended explanation on CSBs here [4].
All vulnerabilities affect third party extensions. These extensions
are not part of the TYPO3 default installation.
Extension: Frontend Filemanager (air_filemanager)
Affected Versions: 0.6.1 and all versions below
Vulnerability Type: Arbitrary code execution on Apache
Severity: HIGH
Solution: An updated version 0.6.2 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/view/air_filemanager/0.6.2/.
Credits: Credits go to Security Team member Marcus Krause, who
discovered and reported the issue.
Extension: CoolURI (cooluri)
Affected Versions: 1.0.11 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: An updated version 1.0.12 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/view/cooluri/1.0.12/.
Note: At the time of this writing, the most recent version of CoolURI
is version 1.0.14 which is available at http://typo3.org/extensions/repository/view/cooluri/1.0.14/
.
Credits: Credits go to Dmitry Dulepov and Jigal van Hemert who
discovered and reported the issue.
Extension: DCD GoogleMap (dcdgooglemap)
Affected Versions: 1.1.0 and all versions below
Vulnerability Type: Cross Site Scripting (XSS)
Severity: Medium
Solution: An updated version 1.1.1 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/view/dcdgooglemap/1.1.1/.
Credits: Credits go to Jochen Rau, who discovered and reported the
issue.
Extension: JobControl (dmmjobcontrol)
Affected Versions: 1.15.0 and all versions below
Vulnerability Type: SQL Injection, Cross Site Scripting (XSS)
Severity: HIGH
Solution: An updated version 1.15.1 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/view/dmmjobcontrol/1.15.1/.
Note: At the time of this writing, the most recent version of
JobControl is version 1.15.2 which is available at
http://typo3.org/extensions/repository/view/dmmjobcontrol/1.15.2/.
Credits: Credits go to Marc Bastian Heinrichs, who discovered and
reported the issues.
Extension: nepa-design.de Spam Protection (nd_antispam)
Affected Versions: 1.0.3
Vulnerability Type: External Setting Manipulation
Severity: low
Solution: This extension is no longer maintained by the author. Please
uninstall and delete the extension folder from your installation. The
extension will no longer be available in the TYPO3 Extension Repository.
Credits: Credits go to Patrick Broens, who discovered and reported the
issue.
Extension: Diocese of Portsmouth Calendar Today (pd_calendar_today)
Affected Versions: 0.0.3 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: This extension is no longer maintained by the author. Please
uninstall and delete the extension folder from your installation. The
extension will no longer be available in the TYPO3 Extension Repository.
Credits: Credits go to Georg Ringer, who discovered and reported the
issue.
Extension: Diocese of Portsmouth Training Courses (pd_trainingcourses)
Affected Versions: 0.1.1
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: This extension is no longer maintained by the author. Please
uninstall and delete the extension folder from your installation. The
extension will no longer be available in the TYPO3 Extension Repository.
Credits: Credits go to Georg Ringer, who discovered and reported the
issue.
Extension: Download system (sb_downloader)
Affected Versions: 0.1.4 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: An updated version 0.1.5 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/view/sb_downloader/0.1.5/.
Note: At the time of this writing, the most recent version of
JobControl is version 0.1.7 which is available at
http://typo3.org/extensions/repository/view/sb_downloader/0.1.7/.
Credits: Credits go to Georg Ringer, who discovered and reported the
issue.
Extension: Random Prayer (ste_prayer)
Affected Versions: 0.0.1
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: This extension is no longer maintained by the author. Please
uninstall and delete the extension folder from your installation. The
extension will no longer be available in the TYPO3 Extension Repository.
Credits: Credits go to Georg Ringer, who discovered and reported the
issue.
Extension: TIMTAB - social bookmark icons (timtab_sociable)
Affected Versions: 2.0.4 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: An updated version 2.0.5 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/view/timtab_sociable/2.0.5/.
Credits: Credits go to Dmitry Dulepov, who discovered and reported the
issue.
Extension: Resource Library (tjs_reslib)
Affected Versions: 0.1.0 and all versions below
Vulnerability Type: Cross Site Scripting (XSS)
Severity: Medium
Solution: This extension is no longer maintained by the author. Please
uninstall and delete the extension folder from your installation. The
extension will no longer be available in the TYPO3 Extension Repository.
Credits: Credits go to Security Team member Marcus Krause, who
discovered and reported the issue.
Extension: Fussballtippspiel (toto)
Affected Versions: 0.1.1 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: An updated version 0.1.2 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/view/toto/0.1.2/.
Credits: Credits go to Security Team member Henning Pingel, who
discovered and reported the issue.
Extension: TARGET-E WorldCup Bets (worldcup)
Affected Versions: 2.0.0 and all versions below
Vulnerability Type: SQL Injection, Cross Site Scripting (XSS)
Severity: HIGH
Solution: An updated version 2.0.1 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/view/worldcup/2.0.1/.
Credits: Credits go to Martin Holtz and Security Team member Marcus
Krause,
who discovered and reported the issues.
General advice: Follow the recommendations that are given in the TYPO3
Security Cookbook [1]. Please subscribe to the typo3-announce mailing
list [2] in order to receive future Security Bulletins via E-mail. All
TYPO3 Security Bulletins are available at the Security Team pages on
typo3.org [3].
[1] http://typo3.org/fileadmin/security-team/typo3_security_cookbook_v-0.5.pdf
[2] http://lists.netfielders.de/cgi-bin/mailman/listinfo/typo3-announce
[3] http://typo3.org/teams/security/security-bulletins/
[4] http://buzz.typo3.org/teams/security/article/collective-security-bulletins-csb-the-reason-for/
Regards,
Lars Houmark
lars at typo3.org
More information about the TYPO3-announce
mailing list