Component Type: Third party extensions. These extensions are not part of the TYPO3 default installation.
Affected Versions: Version 0.6.0 and below
Vulnerability Type: Cross Site Scripting, Remote Code Execution
Severity: HIGH
Problem Description: Failing to filter user input the extension is susceptible to Cross Site Scripting (XSS) making it possible to execute arbitrary JavaScript. Execution of arbitrary PHP script code is also possible due to insufficient file filtering.
Solution: An updated version 0.6.1 is available from the TYPO3 extension manager and at
typo3.org/extensions/repository/view/air_filemanager/0.6.1/
General advice: Follow the recommendations that are given in the TYPO3 SECURITY Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
Credits: Credits go to security team member Marcus Krause, who discovered the issue. Furthermore the TYPO3 Security Team wishes to thank the extension author Thomas Waggershauser. After being informed by the TYPO3 Security Team about the presence of security issues, he has fixed the issues quickly.