Component Type: Third party extension. This extension is not part of the TYPO3 default installation.
Affected Versions: Version 1.1.512 and below
Vulnerability Type: SQL Injection
Problem Description: Failing to filter user input the extension is susceptible to SQL Injections making it possible to get read access to the database.
Solution: An updated version 1.1.513 is available from the TYPO3 extension manager and at typo3.org/extensions/repository/view/sg_zfelib/1.1.513/. Users of the extension are advised to update the extension as soon as possible.
Additional Note: As the mentioned extension is a library which provides functionality for other extensions, all extensions that depend on sg_zfelib (version 1.1.512 and below) will inherit the vulnerability of sg_zfelib.
Extensions based on sg_zfelib are for example: sg_newsplus, sg_address, sg_avmedia, sg_event, sg_genealogy, sg_glossary, sg_newsletter, sg_prodprom, sg_smallads, sg_userdata, sg_filelist, sg_dictionary.
This is not a complete list. More extensions using sg_zfelib may exist that are for example not listed on TER.
Credits: Credits go to Philipp Rocholl and Wassim Amouri, who discovered and reported the issues. Furthermore the TYPO3 Security Team wishes to thank the extension author Stefan Geith for fixing the extension.