TYPO3-EXT-SA-2013-007: Several vulnerabilities in third party extensions

June 03, 2013

Category: TYPO3 Extension
Author: Franz G. Jahn
Keywords: TYPO3, security, TYPO3-EXT-SA-2013-007, extension, accessible_is_browse_results, maag_formcaptcha, meta_feedit, rzautocomplete, sb_folderdownload, sg_zfelib, sg_zlib, tq_seo

Several vulnerabilities have been found in the following third-party TYPO3 extensions: accessible_is_browse_results, maag_formcaptcha, meta_feedit, rzautocomplete, sb_folderdownload, sg_zfelib, sg_zlib, tq_seo

Release Date: June 03, 2013

Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.

Please read our buzz blog post, which has a detailed explanation on CSBs.

All vulnerabilities affect third-party extensions. These extensions are not part of the TYPO3 default installation.

 

Extension: Library for Frontend plugins (sg_zfelib)

Affected Versions: 1.1.774 and all versions below

Vulnerability Type: Arbitrary Code Execution, Priviledge Escalation, File Disclosure

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Credits: Credits go to Stefan Fröhner who discovered and reported the issues.

 

Extension: Library for Frontend plugins (sg_zlib)

Affected Versions: 0.2.991 and all versions below

Vulnerability Type: Arbitrary Code Execution, Priviledge Escalation, File Disclosure

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

 

Extension:meta_feedit (meta_feedit)

Affected Versions: 0.1.10 and all versions below

Vulnerability Type: SQL Injection

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Credits: Credits go to Clemens Riccabona who discovered and reported the issues.

 

Extension: Accessible browse results for indexed search (accessible_is_browse_results)

Affected Versions: 1.2.1 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:P/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Credits: Credits go to Patrick Broens who discovered and reported the issues.

 

Extension: Maag Form Captcha (maag_formcaptcha)

Affected Versions: 2.0.0 and all versions below

Vulnerability Type: Open Redirection

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:P/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Credits: Credits go to Gerrit Vijlbrief who discovered and reported the issues.

 

Extension:  SB Folderdownload (sb_folderdownload)

Affected Versions: 1.1.1 and all versions below

Vulnerability Type: File Disclosure

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:N/A:N/E:P/RL:O/RC:C (What's that?)

Solution: An updated version 1.1.2 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/sb_folderdownload/1.1.2/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported the issues.

 

Extension:  TEQneers SEO Enhancements (tq_seo)

Affected Versions: 5.0.0 and all versions below

Vulnerability Type: Cross Site Request Forgery

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:P/RL:O/RC:C (What's that?)

Solution: An updated version 5.0.1 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/tq_seo/5.0.1/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to TÜV Rheinland i-sec who discovered and reported the issues.

 

Extension: jQuery autocomplete for indexed_search (rzautocomplete)

Affected Versions: 0.0.8 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:P/RL:O/RC:C (What's that?)

Solution: An updated version 0.0.9 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/rzautocomplete/0.0.9/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Clemens Riccabona who discovered and reported the issues.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.