TYPO3-EXT-SA-2012-001: Several vulnerabilities in third party extensions

Several vulnerabilities have been found in the following third-party TYPO3 extensions: css_filelinks, terminal, beuserswitch, rtg_files, irfaq, skt_eurocalc, jftcaforms, bc_post2facebook, aeurltool, mv_cooking, toi_category, ajado_facebook

Release Date: February 2, 2012

 

Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.

Please read our buzz blog post, which has a detailed explanation on CSBs.

All vulnerabilities affect third-party extensions. These extensions are not part of the TYPO3 default installation.

 

Extension: Kitchen recipe (mv_cooking)

Affected Versions: 0.4.0 and all versions below

Vulnerability Type: SQL Injection

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:C/A:N/E:W/RL:OF/RC:C (What's that?)

Solution: An update (version 0.4.1) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/mv_cooking/0.4.1/.

Note: This vulnerability is known to be exploited in the wild.

Credits: Credits go to Raphael Noailles who discovered and reported this issue.

 

Extension: Category-System (toi_category)

Affected Versions: 0.6.0 and all versions below

Vulnerability Type: SQL Injection, Cross-Site Scripting

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:C/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

Extension: White Papers (mm_whtppr)

Affected Versions: 0.0.4 and all versions below

Vulnerability Type: SQL Injection

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:C/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Alexander Kellner who discovered and reported this issue.

 

Extension: Documents download (rtg_files)

Affected Versions: 1.5.1 and all versions below

Vulnerability Type: Cross-Site Scripting, SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:C/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 1.5.2) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/rtg_files/1.5.2/.

Credits: Credits go to Security Team Member Sebastian Böttger who discovered and reported this issue.

 

Extension: Post data records to facebook (bc_post2facebook)

Affected Versions: 0.2.1 and all versions below

Vulnerability Type: Cross-Site Scripting, SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:C/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 0.2.2) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/bc_post2facebook/0.2.2/.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

Extension: System Utilities (sysutils)

Affected Versions: 1.0.3 and all versions below

Vulnerability Type: Information Disclosure

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 1.0.4) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/sysutils/1.0.4/

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

Extension: Webservices for TYPO3 (typo3_webservice)

Affected Versions: 0.3.7 and all versions below

Vulnerability Type: Arbitrary Code Execution

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:C/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 0.3.8) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/typo3_webservice/0.3.8/.

Credits: Credits go to Security Team Member Helmut Hummel who discovered and reported this issue.

 

Extension: CSS styled Filelinks (css_filelinks)

Affected Versions: 0.2.18 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Low

Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 0.2.19) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/css_filelinks/0.2.19/.

Credits: Credits go to Christian Müller who discovered and reported this issue.

 

Extension: Modern FAQ (irfaq)

Affected Versions: 1.1.2 and all versions below

Vulnerability Type: Open Redirection, Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:H/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 1.1.4) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/irfaq/1.1.4/.

Credits: Credits go to Security Team Member Marcus Krause who discovered and reported this issue.

 

Extension: Euro Calculator (skt_eurocalc)

Affected Versions: 0.0.1

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

Extension: Yet another Google search (ya_googlesearch)

Affected Versions: 0.3.9 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 0.3.10) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/ya_googlesearch/0.3.10/.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

Extension: Terminal PHP Shell (terminal)

Affected Versions: 0.3.2 and all versions below

Vulnerability Type: Cross-Site Scripting, Cross Site Request Forgery

Severity: Low

Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author claimed he will not maintain the extension any more. Please uninstall and delete the extension folder from your installation.

Note: Should another maintainer is found and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Jelmer de Hen who discovered and reported this issue.

 

Extension: BE User Switch (beuserswitch)

Affected Versions: 0.0.1

Vulnerability Type: Cross-Site Scripting, Information Disclosure

Severity: Low

Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Security Team Member Helmut Hummel who discovered and reported this issue.

 

 

Extension: Additional TCA Forms (jftcaforms)

Affected Versions: 0.2.0 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Low

Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 0.2.1) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/jftcaforms/0.2.1/.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

Extension: UrlTool (aeurltool)

Affected Versions: 0.1.0

Vulnerability Type: Cross-Site Scripting

Severity: Low

Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Sebastian Mendel who discovered and reported this issue.

 

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.