Cross Site-Scripting in extension "CAB FAL search" (falsearch)

It has been discovered that the extension "CAB FAL search" (falsearch) is susceptible to Cross-Site Scripting.

Release Date: November 07, 2017

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 0.2.0 and below

Vulnerability Type: Cross-Site Scripting

Severity: Low

Suggested CVSS v3.0: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C (What's that?)

CVE: not assigned yet

Problem Description: The extension fails to properly encode user input for output in HTML context. A valid backend user account with access to the filelist backend module is needed to exploit this vulnerability.

Solution: An updated version 0.2.1 is available from the TYPO3 Extension Manager and at https://extensions.typo3.org/extension/download/falsearch/0.2.1/zip/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Christian Seifert who discovered and reported the vulnerability.

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.