TYPO3-SA-2011-003: SQL Injection vulnerabilities in extension "WEC Discussion Forum" (wec_discussion)

It has been discovered that the extension WEC Discussion Forum (wec_discussion) is vulnerable to SQL Injection.

Release Date: April 7, 2011

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: Version 2.1.0 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C (What's that?)

Problem Description: Failing to properly sanitize user-supplied input the extension is open to SQL Injection attacks. The vulnerabilities allow website visitors to inject arbitrary code in database queries.


Solution: An updated version 2.1.1 is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/wec_discussion/2.1.1/. Users of the extension are advised to update the extension as soon as possible.

Note: The vulnerabilities are being exploited in the wild. Please update the extension wec_discussion immediately when being used!

Credits: Credits go to Matthias Hunstock who discovered and reported the issue and TYPO3 Security Team members Sebastian Böttger, Helmut Hummel und Marcus Krause for preparing the security fix.


General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to thetypo3-announce mailing list to receive future Security Bulletins via E-mail.