TYPO3-EXT-SA-2015-013: Arbitrary Code Execution in extension Job Fair (jobfair)

It has been discovered that the extension "Job Fair" (jobfair) is susceptible to Arbitrary Code Execution
Release Date: June 15, 2015
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation. Affected Versions: version 1.0.0 and below Vulnerability Type: Arbitrary Code Execution Severity: High Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:O/RC:C (What's that?) CVE: not assigned yet Problem Description: The extension jobfair offers the possibility to upload files. It was discovered that it was possible to upload files with specially crafted file extensions, which could be executed as PHP files on the server when using Apache as web server with mod_mime available (default). An uploaded file is stored in the extension upload folder and can be executed afterwards. Failing to check the uploaded file name against the fileDenyPattern pattern, jobfair is susceptible to arbitrary code execution. Please also read an older bulletin and a blog article for further information about this issue in combination with Apache as web server. Solution: An updated version 1.0.1 is available from the TYPO3 Extension Manager and at http://typo3.org/extensions/repository/download/jobfair/1.0.1/t3x/. Users of the extension are advised to update the extension as soon as possible. Credits: Credits go to Torben Hansen who discovered and reported the issue. General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.