Multiple vulnerabilities in extension Frontend User Registration (sr_feuser_register)

It has been discovered that the extension Frontend User Registration (sr_feuser_register) is susceptible to Cross Site Scripting (XSS) attacks and allows Remote Command Execution.

Component Type: Third party extensions. These extensions are not part of the TYPO3 default installation.

Affected Versions: All versions (1.4.0, 1.6.0, 2.2.1 to 2.2.7, 2.3.0 to 2.3.6, 2.4.0, 2.5.0 to 2.5.9)

Vulnerability Type: Cross Site Scripting, Remote Code Execution

Severity: HIGH

Problem Description: Failing to filter user input the extension is susceptible to Cross Site Scripting (XSS) making it possible to execute arbitrary JavaScript. Remote Command Execution is also possible allowing the deletion of arbitrary files on the webserver.

Solution: Updated versions are available from the TYPO3 extension manager.

Users of TYPO3 3.x have to upgrade to extension version 2.2.8 which is also available at typo3.org/extensions/repository/view/sr_feuser_register/2.2.8/

Users of TYPO3 4.x have to upgrade to extension version 2.5.10 which is also available at typo3.org/extensions/repository/view/sr_feuser_register/2.5.10/

General advice: Follow the recommendations that are given in the TYPO3 SECURITY Guide. Please subscribe to the typo3-announce mailing list  to receive future Security Bulletins via E-mail.

Credits: Credits go to Philipp Hoffmann, Martin Sonnek and Daniel Pötzinger, who discovered the issues. Furthermore the TYPO3 Security Team wishes to thank the extension author Franz Holzinger for fixing the issue.