TYPO3-EXT-SA-2013-002: Several vulnerabilities in third party extensions

Several vulnerabilities have been found in the following third-party TYPO3 extensions: attacalendar, attacpetition, eu_subscribe, exinit_job_offer, fefilebrowser, js_css_optimizer, kk_csv2table, lonewsseo, mn_mysql2json, news_search, tipafriend_plus, twitter_auth, sofortueberweisung2commerce, sys_messages

Release Date: January 28, 2013

Bulletin Update: November 06, 2014 (added CVE)

Update: January 29, 2013 (fixed link to TYPO3 Security Guide, fixed typo in extension key "exinit_job_offer", adjust affected versions for extension news_search, fixed link to recent version of extension sofortueberweisung2commerce, fixed vulnerability type for sofortueberweisung2commerce, fixed CVSS Score for sofortueberweisung2commerce, fixed credit part for sofortueberweisung2commerce)

Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.

Please read our buzz blog post, which has a detailed explanation on CSBs.

All vulnerabilities affect third-party extensions. These extensions are not part of the TYPO3 default installation

Extension: Tip-A-Friend Plus (tipafriend_plus)

Affected Versions: 0.1.6 and all versions below

Vulnerability Type: Mail Header Injection and Cross-Site-Scripting

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:P/I:C/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: This vulnerability is known to be exploited in the wild. Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Nicole Cordes and Ernst Went who discovered and reported the issues.

Extension: Attac Calendar (attacalendar)

Affected Versions: 1.0.7 and all versions below

Vulnerability Type: SQL Injection

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: This vulnerability is known to be exploited in the wild. Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Thomas Gehring who discovered and reported this issue.

Extension: SEO Pack for tt_news (lonewsseo)

Affected Versions: 1.3.2 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:F/RL:U/RC:C (What's that?)

Solution: An update (version 1.3.3) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/lonewsseo/1.3.3/.

Credits: Credits go to Oliver Hader who discovered and reported this issue.

Extension: Frontend File Browser (fefilebrowser)

Affected Versions: 0.2.1 and all versions below

Vulnerability Type: Arbitrary file upload

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:N/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author claimed he will not maintain the extension any more. Please uninstall and delete the extension folder from your installation.

Note: Should another maintainer be found and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Nabil Saleh who discovered and reported this issue.

Extension: Exinit job offer (exinit_job_offer)

Affected Versions: 0.0.1

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Frederic Gaus who discovered and reported this issue.

Extension: MySQL2JSON (mn_mysql2json)

Affected Versions: 2.1.0 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author claimed he will not maintain the extension any more. Please uninstall and delete the extension folder from your installation.

Note: Should another maintainer be found and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Ingo Renner who discovered and reported this issue.

Extension: Attac Petition (attacpetition)

Affected Versions: 0.0.4 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Security Team Member Franz G. Jahn who discovered and reported this issue.

Extension: Subscription (eu_subscribe)

Affected Versions: 0.0.5 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author claimed he will not maintain the extension any more. Please uninstall and delete the extension folder from your installation.

Note: Should another maintainer be found and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Christian Seifert who discovered and reported this issue.

Extension: News Search (news_search)

Affected Versions: 0.1.0

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:F/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Christian Seifert who discovered and reported this issue.

Extension: Twitter Auth Service (twitter_auth)

Affected Versions: 1.0.0

Vulnerability Type: Authentication Bypass

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:H/Au:N/C:C/I:P/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Security Team Member Franz G. Jahn who discovered and reported this issue.

Extension: From a csv-file to a html-table (kk_csv2table)

Affected Versions: 0.2.2 and all versions below

Vulnerability Type: File Discloure

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:C/I:N/A:N/E:P/RL:O/RC:C (What's that?)

Solution: An update (version 0.2.3) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/kk_csv2table/0.2.2/.

Credits: Credits go to Security Team Member Franz G. Jahn who discovered and reported this issue

Extension: Javascript and CSS Optimizer (js_css_optimizer)

Affected Versions: 1.1.13 and all versions below

Vulnerability Type: Cross-Site-Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

CVE: CVE-2013-5570

Solution: An update (version 1.1.14) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/js_css_optzimizer/1.1.14/.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

Extension: UserTask Center, Messaging (sys_messages)

Affected Versions: 1.1.0 and all versions below

Vulnerability Type: Cross-Site-Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author claimed he will not maintain the extension any more. Please uninstall and delete the extension folder from your installation.

Note: Should another maintainer be found and provide a fixed version, the extension could return to the TYPO3 Extension Repository

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

Extension: sofortueberweisung2commerce (sofortueberweisung2commerce)

Affected Versions: 2.0.0

Vulnerability Type: SQL Injection

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:H/Au:N/C:C/I:N/A:N/E:U/RL:O/RC:C (What's that?)

Solution: An update (version 2.0.1) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/sofortueberweisung2commerce/2.0.1/.

Credits: Credits go to Thomas Luzat who discovered and reported this issue.

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.