2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005

SQL Injection in extension "Events" (jp_events)

September 29, 2016

Author: Nicole Cordes
Keywords: TYPO3, security, typo3-ext-sa-2016-024, extension, jp_events, SQL injection

It has been discovered that the extension "Events" (jp_events) is susceptible to SQL Injection.

Release Date: September 29, 2016

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 0.0.2 and below

Vulnerability Type: SQL Injection

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:O/RC:C (What's that?)

Problem Description: The extension fails to properly sanitize user input and is vulnerable to SQL Injection.

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension is no longer maintained and the author will not provide a security fix for the reported vulnerability. Please uninstall and delete the extension from your installation.

Credits: Credits go to Ingo Schmitt who discovered and reported the vulnerability.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.


Add comment

Please log in or sign up to comment.