Cross Site-Scripting in extension "CAB FAL search" (falsearch)
November 07, 2017
Author: Torben Hansen
Keywords: TYPO3, security, typo3-ext-sa-2017-013, extension, falsearch, Cross-Site Scripting
It has been discovered that the extension "CAB FAL search" (falsearch) is susceptible to Cross-Site Scripting.
Release Date: November 07, 2017
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: version 0.2.0 and below
Vulnerability Type: Cross-Site Scripting
CVE: not assigned yet
Problem Description: The extension fails to properly encode user input for output in HTML context. A valid backend user account with access to the filelist backend module is needed to exploit this vulnerability.
Solution: An updated version 0.2.1 is available from the TYPO3 Extension Manager and at https://extensions.typo3.org/extension/download/falsearch/0.2.1/zip/. Users of the extension are advised to update the extension as soon as possible.
Credits: Credits go to Christian Seifert who discovered and reported the vulnerability.