TYPO3-EXT-SA-2011-006: Several vulnerabilities in third party extensions

August 29, 2011

Category: TYPO3 Extension
Author: Helmut Hummel
Keywords: TYPO3, security, TYPO3-EXT-SA-2011-006, extension

Several vulnerabilities have been found in the following third-party TYPO3 extensions: MM DAM - FEFileList (mm_dam_filelist), Events (julle_events), WEC Staff Directory (wec_staffdirectory), TGM news (tgm_news), TGM media (tgm_media), TGM calendar module (tgm_cal), DAM Lightbox (damlightbox), Download system (sb_downloader), iwbase (iwbase), Fussballtippspiel (toto), Font resizer (fontsizer), Adminer (t3adminer)

Release Date: August 29, 2011

Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.

Please read our buzz blog post, which has a detailed explanation on CSBs.

All vulnerabilities affect third-party extensions. These extensions are not part of the TYPO3 default installation.

 

 

Extension: MM DAM - FEFileList (mm_dam_filelist)

Affected Versions: 2.0.3 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:H/RL:U/RC:C (What's that?)

Note: The vulnerability is being exploited in the wild. Please remove the extension mm_dam_filelist immediately when being used!

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, the author claimed to have no time to completely fix the vulnerability in his extension. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.

Note: Should the author decide to provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Mirco Rohloff and Security Team Member Georg Ringer who discovered and reported this issue.

 

 

Extension: Events (julle_events)

Affected Versions: 1.2.0 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:U/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The author will not maintain the extension any more. Please uninstall this extension and delete all files belonging to it from your TYPO3 installation.

Credits: Credits go to Simon Sharp who discovered and reported this issue.

 

 

Extension: WEC Staff Directory (wec_staffdirectory)

Affected Versions: 2.1.1 and all versions below

Vulnerability Type: Arbitrary Code Execution

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:C/I:P/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: An update (version 2.1.2) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/wec_staffdirectory/2.1.2/.

Credits: Credits go to David Denicol√≤ who discovered and reported this issue.

 

 

Extension: TGM news (tgm_news)

Affected Versions: 0.4.1 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: An update (version 0.4.2) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/tgm_news/0.4.2/.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

 

Extension: TGM media (tgm_media)

Affected Versions: 0.1.8 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: An update (version 0.2.0) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/tgm_media/0.2.0/.

Credits: Credits go to Sebastiaan de Jonge who discovered and reported this issue.

 

 

Extension: TGM calendar module (tgm_cal)

Affected Versions: 0.2.0 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: An update (version 0.2.1) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/tgm_cal/0.2.1/.

Credits: Credits go to Extension Author Steffen Thierock who discovered and reported this issue.

 

 

Extension: DAM Lightbox (damlightbox)

Affected Versions: 0.1.1 and all versions below

Vulnerability Type: SQL Injection, Cross-Site Scripting

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: An update (version 0.1.2) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/damlightbox/0.1.2/.

Credits: Credits go to Extension Author Torsten Schrade who discovered and reported this issue.

 

 

Extension: Download system (sb_downloader)

Affected Versions: 1.0.5 and all versions below

Vulnerability Type: Information Disclosure (through Path Traversal)

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: An update (version 1.0.6) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/sb_downloader/1.0.6/.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

 

Extension: iwbase (iwbase)

Affected Versions: 1.5.1 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: An update (version 1.5.2) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/iwbase/1.5.2/.

Credits: Credits go to Christian Seifert who discovered and reported this issue.

 

 

Extension: Fussballtippspiel (toto)

Affected Versions: 0.1.2 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The author will not maintain the extension any more. Please uninstall this extension and delete all files belonging to it from your TYPO3 installation.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

 

Extension: Font resizer (fontsizer)

Affected Versions: 2.0.2 and all versions below

Vulnerability Type: Open Redirection

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: An update (version 2.0.3) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/fontsizer/2.0.3/.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

 

Extension: Adminer (t3adminer)

Affected Versions: 0.0.2 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:N/A:N/E:U/RL:OF/RC:C (What's that?)

Solution: An update (version 0.0.3) is available from the TYPO3 extension manager and athttp://typo3.org/extensions/repository/view/t3adminer/0.0.3/.

Credits: Credits go to Security Team Member Georg Ringer who discovered and reported this issue.

 

 

General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to thetypo3-announce mailing list to receive future Security Bulletins via E-mail.