TYPO3-SA-2009-021: Multiple vulnerabilities in third party extensions

Several vulnerabilities have been found in the following third party TYPO3 extensions: MK-AnydropdownMenu (mk_anydropdownmenu), Photo Book (goof_fotoboek), SB Folderdownload (sb_folderdownload), Developer log (devlog), KJ: Imagelightbox (kj_imagelightbox2), Unit Converter (cs2_unitconv), powermail (powermail), TV21 Talkshow (tv21_talkshow), Helpdesk (mg_help), Vote rank for news (vote_for_tt_news), kiddog_mysqldumper (kiddog_mysqldumper), tt_news Mail alert (dl3_tt_news_alerts), TT_Products editor (ttpedit), User Links (vm19_userlinks), MJS Event Pro (mjseventpro), Googlemaps fr tt_news (jf_easymaps), BB Simple Jobs (bb_simplejobs), Reports for Job (job_reports), Clan Users List (pb_clanlist), Customer Reference List (ref_list), zak_store_management (zak_store_management), Reports Logfile View (reports_logview), Majordomo (majordomo), Tip many friends (mimi_tipfriends), VD / Geomap (vd_geomap)

Release Date: January 13, 2010

Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.

Please read our buzz blog post, which has a detailed explanation on CSBs.

All vulnerabilities affect third party extensions. These extensions are not part of the TYPO3 default installation.

Extension: MK-AnydropdownMenu (mk_anydropdownmenu)
Affected Versions: 0.3.28 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: An update (version 0.4.0) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/mk_anydropdownmenu/0.4.0/.
Credits: Credits go to Rupert Germann, who discovered and reported the issue.

Extension: Photo Book (goof_fotoboek)
Affected Versions: 1.7.14 and all versions below
Vulnerability Type: Information Disclosure / Path traversal
Severity: High
Solution: An update (version 1.7.15) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/goof_fotoboek/1.7.15/.
Credits: Credits go to Peter Athmann, who discovered and reported the issue.

Extension: Customer Reference List (ref_list)
Affected Versions: 1.0.1 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: An update (version 1.0.2) is available from the TYPO3 extension manager and at typo3.org/extensions/repository/view/ref_list/1.0.2/.
Credits: Credits go to Christian Seifert, who discovered and reported the issue.

Extension: SB Folderdownload (sb_folderdownload)
Affected Versions: 0.2.2 and all versions below
Vulnerability Type: Information Disclosure
Severity: High
Solution: An update (version 0.2.3) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/sb_folderdownload/0.2.3/.
Credits: Credits go to Pim Broens, who discovered and reported the issue.

Extension: Developer log (devlog)
Affected Versions: 2.9.1 and all versions below
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: Medium
Solution: An update (version 2.9.2) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/devlog/2.9.2/.
Credits: Credits go to Steffen Müller and Francois Suter, who discovered and reported the issue.

  

Extension: KJ: Imagelightbox (kj_imagelightbox2)
Affected Versions: 2.0.0 and all versions below
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: Medium
Solution: An update (version 2.0.2) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/kj_imagelightbox2/2.0.2/.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

  

Extension: Unit Converter (cs2_unitconv)
Affected Versions: 1.0.4
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: Medium
Solution: An update (version 1.0.5) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/cs2_unitconv/1.0.5/.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

  

Extension: powermail (powermail)
Affected Versions: 1.5.1 and all versions below
Vulnerability Type: SQL injection
Severity: Medium
Solution: An update (version 1.5.2) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/powermail/1.5.2/.
Credits: Credits go to Sascha Egerer, who discovered and reported the issue.

  

Extension: Googlemaps for tt_news (jf_easymaps)
Affected Versions: 1.0.2 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: An update (version 1.0.3) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/jf_easymaps/1.0.3/.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

Extension: TV21 Talkshow (tv21_talkshow)
Affected Versions: 1.0.1 and all versions below
Vulnerability Type: Cross-Site Scripting (XSS) and SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

Extension: Helpdesk (mg_help)
Affected Versions: 1.1.6 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Security Team Member Georg Ringer, who discovered and reported the issue.

Extension: Vote rank for news (vote_for_tt_news)
Affected Versions: 1.0.1 and all versions below
Vulnerability Type: Cross-Site Scripting (XSS) and SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

Extension: kiddog_mysqldumper (kiddog_mysqldumper)
Affected Versions: 0.0.3 and all versions below
Vulnerability Type: Information Disclosure
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since the author didn't provide a patch in time. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to TYPO3 Security Team member Georg Ringer, who discovered and reported the issue.

Extension: tt_news Mail alert (dl3_tt_news_alerts)
Affected Versions: 0.2.0 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

Extension: TT_Products editor (ttpedit)
Affected Versions: 0.0.2 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

Extension: User Links (vm19_userlinks)
Affected Versions: 0.1.1 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

Extension: MJS Event Pro (mjseventpro)
Affected Versions: 0.2.1 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since the author didn't provide a patch in time. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Rupert Germann, who discovered and reported the issue.

Extension:  BB Simple Jobs (bb_simplejobs)
Affected Versions: 0.1.0 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since the author didn't provide a patch in time. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Frederic Gaus, who discovered and reported the issue.

Extension: Reports for Job (job_reports)
Affected Versions: 0.1.0 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since the author didn't provide a patch in time. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Frederic Gaus, who discovered and reported the issue.

Extension: Clan Users List (pb_clanlist)
Affected Versions: 0.0.1
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The author told us that he's no longer maintaining this extension. Please uninstall and delete all files belonging to it from your TYPO3 installation.
Credits: Credits go to TYPO3 Security Team member Georg Ringer, who discovered and reported the issue.

Extension: zak_store_management (zak_store_management)
Affected Versions: 1.0.0 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

Extension: Majordomo (majordomo)
Affected Versions: 1.1.3 and all versions below
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: Medium
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to TYPO3 Security Team member Georg Ringer, who discovered and reported the issue.

Extension: Tip many friends (mimi_tipfriends)
Affected Versions: 0.0.2 and all versions below
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: Medium
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

Extension: VD / Geomap (vd_geomap)
Affected Versions: 0.3.1 and all versions below
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: Medium
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to the typo3-announce mailing list in order to receive future Security Bulletins via E-mail.