TYPO3-EXT-SA-2024-003: Multiple vulnerabilities in "Events 2" (events2)

Categories: Development Created by Torben Hansen
It has been discovered that the extension "Events 2" (events2) is susceptible to Cache Poisoning, Insecure Direct Object Reference and SQL wildcard injection.

Problem Description

Wrong cache configuration for some actions lead to caching of possible sensitive event data. Depending on the frontend user group, an authenticated  frontend user might get access to cached data.

Missing access checks in the management plugin lead to an insecure direct object reference (IDOR) vulnerability with the potential to activate or delete various events for unauthenticated users.

The extension fails to properly escape user input for a LIKE comparison, resulting in SQL wildcard injection.

Solution

Updated versions 8.3.8 and 9.0.6 are available from the TYPO3 extension manager, packagist and at
https://extensions.typo3.org/extension/download/events2/8.3.8/zip
https://extensions.typo3.org/extension/download/events2/9.0.6/zip
Users of the extension are advised to update the extension as soon as possible.

Credits

Thanks to Stefan Frömken and TYPO3 Security Team member Torben Hansen for reporting the vulnerabilities and to Stefan Frömken for providing updated versions of the extension.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.