Release Date: April 7, 2011
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: Version 2.1.0 and all versions below
Vulnerability Type: SQL Injection
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C (What's that?)
Problem Description: Failing to properly sanitize user-supplied input the extension is open to SQL Injection attacks. The vulnerabilities allow website visitors to inject arbitrary code in database queries.
Solution: An updated version 2.1.1 is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/wec_discussion/2.1.1/. Users of the extension are advised to update the extension as soon as possible.
Note: The vulnerabilities are being exploited in the wild. Please update the extension wec_discussion immediately when being used!
Credits: Credits go to Matthias Hunstock who discovered and reported the issue and TYPO3 Security Team members Sebastian Böttger, Helmut Hummel und Marcus Krause for preparing the security fix.
General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to thetypo3-announce mailing list to receive future Security Bulletins via E-mail.