SQL Injection in extension "Browser - TYPO3 without PHP" (browser)

It has been discovered that the extension "Browser - TYPO3 without PHP" (browser) is susceptible to SQL Injection.

Release Date: May 31, 2016

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 7.4.8 and below

Vulnerability Type: SQL Injection

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:O/RC:C (What's that?)

Problem Description: The extension fails to properly sanitize user input and is vulnerable to SQL Injection. This vulnerability is only exploitable if the Development Reporting System (DRS) is enabled and any filter is used. DRS is disabled by default.

Solution: An updated version 7.5.0 is available from the TYPO3 Extension Manager and at https://typo3.org/extensions/repository/download/browser/7.5.0/t3x/. Users of the extension are advised to update the extension as soon as possible.

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.