TYPO3-SA-2010-015: Multiple vulnerabilities in third-party extensions

Several vulnerabilities have been found in the following third party TYPO3 extensions: Event (event), Fe user statistic (festat), JW Calendar (jw_calendar), Questionnaire (ke_questionnaire), Branchenbuch [Yellow Pages] (mh_branchenbuch), Webkit PDFs (webkitpdf), xaJax Shoutbox (vx_xajax_shoutbox)

Release Date: August 11, 2010

Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.

Please read our buzz blog post, which has a detailed explanation on CSBs.

All vulnerabilities affect third party extensions. These extensions are not part of the TYPO3 default installation.

Extension: Event (event)

Affected Versions: 0.3.4 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 0.3.7) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/event/0.3.7/.

Credits: Credits go to TYPO3 Security Team member Marcus Krause who discovered and reported this issue.

Extension: Fe user statistic (festat)

Affected Versions: 0.2.0 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 0.2.4) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/festat/0.2.4/.

Credits: Credits go to TYPO3 Security Team member Marcus Krause who discovered and reported this issue.

Extension: JW Calendar (jw_calendar)

Affected Versions: 1.3.20 and all versions below

Vulnerability Type: Arbitrary code execution

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:N/E:POC/RL:U/RC:C (What's that?)

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.

Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.

Credits: Credits go to Guide Schmechel who discovered and reported this issue.

Extension: Questionnaire (ke_questionnaire)

Affected Versions: 2.2.2 and all versions below

Vulnerability Type: SQL Injection, Cross-Site-Scripting (XSS)

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:N/E:POC/RL:OF/RC:C (What's that?)

Solution: An update (version 2.2.3) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/ke_questionnaire/2.2.3/.

Note: At the time of writing, the most recent version of Questionaire is version 2.2.5 which is available at typo3.org/extensions/repository/view/ke_questionnaire/2.2.5/.

Credits: Credits go to Patrick Broens, who discovered and reported the issues.

Extension: Branchenbuch [Yellow Pages] (mh_branchenbuch)

Affected Versions: 0.9.0 and all versions below

Vulnerability Type: Cross-Site-Scripting (XSS)

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 0.9.1) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/mh_branchenbuch/0.9.1/.

Credits: Credits go to TYPO3 Security Team member Marcus Krause who discovered and reported this issue.

Extension: Webkit PDFs (webkitpdf)

Affected Versions: 1.1.3 and all versions below

Vulnerability Type: Remote Command Injection, SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 1.1.4) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/webkitpdf/1.1.4/.

Note: At the time of writing, the most recent version of Webkit PDFs is version 1.1.5 which is available at typo3.org/extensions/repository/view/webkitpdf/1.1.5/.

Credits: Credits go to Sven Taute, who discovered and reported the issues.

Extension: xaJax Shoutbox (vx_xajax_shoutbox)

Affected Versions: 1.0.0 and all versions below

Vulnerability Type: Cross-Site-Scripting (XSS)

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C (What's that?)

Solution: An update (version 1.0.1) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/vx_xajax_shoutbox/1.0.1/.

Credits: Credits go to Jörg Winter, who discovered the issue and TYPO3 Security Team member Georg Ringer who reported this issue.

General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to the typo3-announce mailing list