TYPO3-SA-2009-018: Cross-Site Scripting vulnerability in extension Direct Mail (direct_mail)

It has been discovered that the extension Direct Mail (direct_mail) is vulnerable to XSS.

Release Date: December 1, 2009

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: Version 2.6.4 and all versions below

Vulnerability Type: Cross-Site Scripting (XSS)

Severity: Low

Problem Description: Failing to properly sanitize user-supplied input the extension is open to Cross-Site Scripting (XSS) attacks. The vulnerability allows authenticated website editors to execute JavaScript code or HTML in the Direct Mail Backend module used to administrate newsletter configurations. With specially crafted JavaScript it is also possible to create malicious database records.

Solution: An updated version 2.6.5 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/direct_mail/2.6.5/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to TYPO3 Security Team member Georg Ringer who discovered and reported the issue.

General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.