Release Date: February 19, 2013
Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.
Please read our buzz blog post, which has a detailed explanation on CSBs.
All vulnerabilities affect third-party extensions. These extensions are not part of the TYPO3 default installation.
Extension: Fluid Extbase Development Framework (fed)
Affected Versions: 5.0.2 and all versions below
Vulnerability Type: Command Injection and Insecure Unserialize
Severity: Critical
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What's that?)
Solution: An update (version 5.0.3) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/fed/5.0.3/.
Credits: Credits go to TÜV Rheinland i-sec who discovered and reported the issues.
Extension: WEC Discussion Forum (wec_discussion)
Affected Versions: 2.1.1 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What's that?)
Solution: An update (version 2.1.2) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/wec_discussion/2.1.2/.
Credits: Credits go to Florian Wessner who discovered and reported the issues.
Extension: RSS feed from records (push2rss_3ds)
Affected Versions: 1.0.0 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:U/RC:C (What's that?)
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.
Credits: Credits go to Andy Grunwald who discovered and reported the issues.
Extension: Slideshare (slideshare)
Affected Versions: 0.1.0
Vulnerability Type: SQL Injection
Severity: High
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:U/RC:C (What's that?)
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.
Credits: Credits go to Philipp Kitzberger who discovered and reported the issues.
Extension: My quiz and poll (myquizpoll)
Affected Versions: 2.0.0 and all versions below
Vulnerability Type: SQL Injection and Cross-Site Scripting
Severity: High
Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:C/I:P/A:N/E:P/RL:O/RC:C (What's that?)
Solution: An update (version 2.0.6) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/myquizpoll/2.0.6/.
Note: At the time of writing, the most recent version of My quiz and poll is version 2.1.0 which is available at http://typo3.org/extensions/repository/view/myquizpoll/2.1.0/.
Credits: Credits go to Roberto Presedo who discovered and reported the issues.
General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.