TYPO3 Security Bulletin

Several vulnerabilities have been found in the following third party TYPO3 extensions: "Vox populi" (mv_vox_populi), "SB Universal Plugin" (SBuniplug), "Simple File Browser" (simplefilebrowser), "TU-Clausthal ODIN" (tuc_odin), "TU-Clausthal Staff" (tuc_staff), "WEBERkommunal Facilities" (wes_facilities)

Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.

Please read our buzz blog post, which has a detailed explanation on CSBs.

All vulnerabilities affect third party extensions. These extensions are not part of the TYPO3 default installation.

Extension: Vox populi (mv_vox_populi)
Affected Versions: 0.3.0 and all versions below
Vulnerability Type: Cross-Site Scripting
Severity: Medium
Solution: An update (version 0.3.1) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/mv_vox_populi/0.3.1/.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

Extension: SB Universal Plugin (SBuniplug)
Affected Versions: 2.0.1 and all versions below
Vulnerability Type: Cross-Site Scripting
Severity: Medium
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since the extension author wasn't able to provide a security fix within the 21 days time-frame defined in our TYPO3 Extension Security Policy. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Jochen Rau, who discovered and reported the issue.

Extension: Simple File Browser (simplefilebrowser)
Affected Versions: 1.0.2 and all versions below
Vulnerability Type: Information Disclosure
Severity: low
Solution: An update (version 1.0.3) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/simplefilebrowser/1.0.3/.
Credits: Credits go to Werner Modenbach, who discovered and reported the issue.

Extension: TU-Clausthal ODIN (tuc_odin)
Affected Versions: 0.0.1, 0.1.0, 0.1.1 and 0.2.0
Vulnerability Type: Cross-Site Scripting
Severity: Medium
Solution: An update (version 0.1.0, upload on 2008-11-25) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/tuc_odin/0.1.0/.
Note: Please mind the wrong versioning scheme - extension version 0.1.0 is the most recent one and includes the security fix.
The extension author informed us that he won't maintain this extension any longer.
Credits: Credits go to Alexander Kellner, who discovered and reported the issues.

Extension: TU-Clausthal Staff (tuc_staff)
Affected Versions: 0.3.0 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: An update (version 0.4.0) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/tuc_staff/0.4.0/.
Credits: Credits go to Alexander Kellner, who discovered and reported the issue.

Extension: WEBERkommunal Facilities (wes_facilities)
Affected Version: 2.0.0
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: An update (version 2.0.1) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/wes_facilities/2.0.1/.
Note: At the time of writing, the most recent version of WEBERkommunal Facilities is version 2.0.2 which is available at http://typo3.org/extensions/repository/view/wes_facilities/2.0.2/.
Credits: Credits go to Georg Ringer, who discovered and reported the issue.

General advice: Follow the recommendations that are given in the TYPO3 SECURITY Guide. Please subscribe to the typo3-announce mailing list in order to receive future Security Bulletins via E-mail.