Component Type: Third party extension. This extension is not part of the TYPO3 default installation.
Affected Versions: Version 1.1.512 and below
Vulnerability Type: SQL Injection
Severity: High
Problem Description: Failing to filter user input the extension is susceptible to SQL Injections making it possible to get read access to the database.
Solution: An updated version 1.1.513 is available from the TYPO3 extension manager and at typo3.org/extensions/repository/view/sg_zfelib/1.1.513/. Users of the extension are advised to update the extension as soon as possible.
Additional Note: As the mentioned extension is a library which provides functionality for other extensions, all extensions that depend on sg_zfelib (version 1.1.512 and below) will inherit the vulnerability of sg_zfelib.
Extensions based on sg_zfelib are for example: sg_newsplus, sg_address, sg_avmedia, sg_event, sg_genealogy, sg_glossary, sg_newsletter, sg_prodprom, sg_smallads, sg_userdata, sg_filelist, sg_dictionary.
This is not a complete list. More extensions using sg_zfelib may exist that are for example not listed on TER.
General advice: Follow the recommendations that are given in the TYPO3 SECURITY Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
Credits: Credits go to Philipp Rocholl and Wassim Amouri, who discovered and reported the issues. Furthermore the TYPO3 Security Team wishes to thank the extension author Stefan Geith for fixing the extension.