Release Date: December 1, 2009
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: Version 1.2.0 and all versions below
Vulnerability Type: Blind SQL Injection
Severity: High
Problem Description: Failing to filter user input the extension is open to Blind SQL Injection. The vulnerability allows remote website users to execute arbitrary commands on the TYPO3 database.
Solution: An updated version 1.2.1 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/cal/1.2.1/. Users of the extension are advised to update the extension as soon as possible.
Credits: Credits go to Michael Tschannen who discovered and reported the issue.
General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.