TYPO3-EXT-SA-2011-003: Several Vulnerabilities in extension Formhandler (formhandler)

August 25, 2011

Category: TYPO3 Extension
Author: Helmut Hummel
Keywords: TYPO3, security, TYPO3-EXT-SA-2011-003, extension, formhandler

It has been discovered that the extension Formhandler (formhandler) is vulnerable to SQL-Injection and Cross-Site Scripting.

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: Version 0.9.14 and below

Vulnerability Types: SQL Injection, Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:C/A:P/E:U/RL:OF/RC:C (What's that?)

Release Date: 25.08.2011


Problem Description: Failing to properly sanitize user input, formhandler is susceptible to SQL Injection. An attacker could delete arbitrary database tables. Editors rights with permission to use the formhandler backend module are required for this to work.

Failing to encode user data for the HTML output, formhandler is susceptible to Cross Site Scripting. Exploiting this issue is not possible in the default configuration since formhandler performs several filters on the entered data. But it is possible to turn this filter off in the TypoScript configuration.

Solution: An updated version 0.9.15 is available from the TYPO3 extension manager and attypo3.org/extensions/repository/view/formhandler/0.9.15/.

Credits: Thanks to Jens Hoffrichter who discovered and reported this issue.


General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to thetypo3-announce mailing list to receive future Security Bulletins via E-mail.