TYPO3-EXT-SA-2013-013: Several vulnerabilities in third party extensions

Several vulnerabilities have been found in the following third-party TYPO3 extensions: browser, ke_search, locator, realurlmanagement, wfqbe
Release Date: August 05, 2013 Bulletin update: September 5, 2014 (added CVEs) Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each. Please read our buzz blog post, which has a detailed explanation on CSBs. All vulnerabilities affect third-party extensions. These extensions are not part of the TYPO3 default installation. Extension: Browser - TYPO3 without PHP (browser) Affected Versions: 4.5.4 and all versions below Vulnerability Type: SQL Injection Severity: High Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:N/E:F/RL:U/RC:C (What's that?) CVE: CVE-2013-5306 Solution: An updated version 4.5.5 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/browser/4.5.5/. Users of the extension are advised to update the extension as soon as possible. Credits: Credits go to Willehad Grafenhorst who discovered and reported the issues. Extension: Store Locator (locator) Affected Versions: 3.1.4 and all versions below Vulnerability Type: SQL Injection, Insecure Unserialize and Cross-Site Scripting Severity: Critical Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:N/E:F/RL:O/RC:C (What's that?) CVE: CVE-2013-5303 for Insecure Unserialize, CVE-2013-5304 for SQLi, CVE-2013-5303 for XSS Solution: An updated version 3.1.5 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/locator/3.1.5/. Users of the extension are advised to update the extension as soon as possible. Credits: Credits go to Ingo Schmitt who discovered and reported the issues. Extension: Faceted Search (ke_search) Affected Versions: 1.4.0 and all versions below Vulnerability Type: SQL Injection and Cross-Site Scripting Severity: High Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:P/RL:O/RC:C (What's that?) CVE: CVE-2013-5302 for XSS, CVE-2013-5307 for SQLi Solution: An updated version 1.4.1 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/ke_search/1.4.1/. Users of the extension are advised to update the extension as soon as possible. Credits: Credits go to Extension Author Christian Bülter who discovered and reported the issues. Extension: RealURL Management (realurlmanagement) Affected Versions: 0.3.4 and all versions below Vulnerability Type: Cross-Site Scripting Severity: Medium Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:P/RL:U/RC:C (What's that?) CVE: CVE-2013-5308 Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author claimed he will not maintain the extension any more. Please uninstall and delete the extension folder from your installation. Credits: Credits go to TYPO3 Security Team Member Franz G. Jahn who discovered and reported the issues. Extension: DB Integration (wfqbe) Affected Versions: 2.0.0 and all versions below Vulnerability Type: SQL Injection Severity: High Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What's that?) CVE: CVE-2013-5310 Solution: An updated version 2.0.1 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/wfqbe/2.0.1/. Users of the extension are advised to update the extension as soon as possible. Credits: Credits go to Olaf Döring who discovered and reported the issues. General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.