- Release Date: June 18, 2024
- Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
- Component: "Events 2" (events2)
- Composer Package Name: jweiland/events2
- Vulnerability Type: Cache Poisoning, Insecure Direct Object Reference and SQL wildcard injection
- Affected Versions: 8.3.7 and below, 9.0.0 - 9.0.5
- Severity: Medium
- Suggested CVSS v3.1: AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:F/RL:O/RC:C
- References: CVE-2024-38874, CWE-524, CWE-284, CWE-89
Problem Description
Wrong cache configuration for some actions lead to caching of possible sensitive event data. Depending on the frontend user group, an authenticated frontend user might get access to cached data.
Missing access checks in the management plugin lead to an insecure direct object reference (IDOR) vulnerability with the potential to activate or delete various events for unauthenticated users.
The extension fails to properly escape user input for a LIKE comparison, resulting in SQL wildcard injection.
Solution
Updated versions 8.3.8 and 9.0.6 are available from the TYPO3 extension manager, packagist and at
https://extensions.typo3.org/extension/download/events2/8.3.8/zip
https://extensions.typo3.org/extension/download/events2/9.0.6/zip
Users of the extension are advised to update the extension as soon as possible.
Credits
Thanks to Stefan Frömken and TYPO3 Security Team member Torben Hansen for reporting the vulnerabilities and to Stefan Frömken for providing updated versions of the extension.
General Advice
Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.