Release Date: March 2, 2010
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: Version 1.3.1 and all versions below
Vulnerability Type: Blind SQL Injection
Severity: Medium
Problem Description: Failing to filter input from a third party data source (iCalendar) the extension is open to a Blind SQL Injection. The vulnerability allows remote website users to execute arbitrary commands on the TYPO3 database.
Solution: An updated version 1.3.2 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/cal/1.3.2/. Users of the extension are advised to update the extension as soon as possible.
Credits: Credits go to Christian Ferbar who discovered and reported the issue.
General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.