Component Type: Third party extension. This extension is not part of the TYPO3 default installation.
Affected Versions: Version 2.6.2 and below (Cross Site Scripting), Version 2.5.0 and below (Path Traversal, Information Disclosure, Cross Site Scripting).
Vulnerability Type: Path Traversal and Information Disclosure, Cross Site Scripting
Severity: High
Problem Description: A problem has been discovered in the wt_gallery extension, which allows a user to download arbitrary image-files from and may disclose the directory structure of the server. Cross Site Scripting is also possible by injecting HTML or JavaScript code because the extension fails to properly sanitize user-supplied input.
Solution: A fixed version 2.6.3 is available in the extension repository and at
typo3.org/extensions/repository/view/wt_gallery/2.6.3/. Users of the extension wt_gallery are advised to update the extension as soon as possible.
General advice: Follow the recommendations that are given in the TYPO3 SECURITY Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
Credits: Credits go to security team members Helmut Hummel and Henning Pingel, who discovered the issues. Furthermore the TYPO3 Security Team wishes to thank the extension author Alexander Kellner for fixing the issue.