Release Date: September 25, 2014
Bulletin update: October 6, 2014 (added CVEs)
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: version 2.14.0 and below
Vulnerability Type: Cross-Site Scripting, SQL Injection
Severity: High
Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:A/I:P/A:N/E:H/RL:U/RC:C (What's that?)
CVE: CVE-2014-7200 (XSS), CVE-2014-7201 (SQLi)
Problem Description: The extension fails to properly escape user input in SQL and HTML context.
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author is no longer maintaining this extension. Please uninstall and delete the extension folder from your installation.
Credits: Credits go to Hans-Martin Münch who discovered and reported the issues.
General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.