Multiple Cross-Site Scripting vulnerabilities in frontend

Component Type: TYPO3 CMS

Release Date: December 15, 2015

 

Vulnerable subcomponent: Frontend

Vulnerability Type: Cross-Site Scripting

Affected Versions: Versions 6.2.0 to 6.2.15, 7.0.0 to 7.6.0

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:O/RC:C

CVE: not assigned yet

Problem Description: Failing to properly encode editor input, several frontend components are susceptible to Cross-Site Scripting, allowing authenticated editors to inject arbitrary HTML.

Solution: Update to TYPO3 versions 6.2.16 or 7.6.1 that fix the problem described.

Important Note: Please pay attention that these fixes add default TypoScript settings. If you overwrite or delete the provided TypoScript for css_styled_content and/or fe_login make sure you add the htmlspecialchars function on your own. These are the TypoScript settings that need to be changed to apply proper HTML encoding to editor content:

plugin.tx_felogin_pi1 {
    welcomeHeader_stdWrap {
        htmlSpecialChars = 1
    }
    welcomeMessage_stdWrap {
        htmlSpecialChars = 1
    }
    successHeader_stdWrap {
        htmlSpecialChars = 1
    }
    successMessage_stdWrap {
        htmlSpecialChars = 1
    }
    logoutHeader_stdWrap {
        htmlSpecialChars = 1
    }
    logoutMessage_stdWrap {
        htmlSpecialChars = 1
    }
    errorHeader_stdWrap {
        htmlSpecialChars = 1
    }
    errorMessage_stdWrap {
        htmlSpecialChars = 1
    }
    forgotHeader_stdWrap {
        htmlSpecialChars = 1
    }
    forgotMessage_stdWrap {
        htmlSpecialChars = 1
    }
    forgotErrorMessage_stdWrap {
        htmlSpecialChars = 1
    }
    forgotResetMessageEmailSentMessage_stdWrap {
        htmlSpecialChars = 1
    }
    changePasswordNotValidMessage_stdWrap {
        htmlSpecialChars = 1
    }
    changePasswordTooShortMessage_stdWrap {
        htmlSpecialChars = 1
    }
    changePasswordNotEqualMessage_stdWrap {
        htmlSpecialChars = 1
    }
    changePasswordHeader_stdWrap {
        htmlSpecialChars = 1
    }
    changePasswordMessage_stdWrap {
        htmlSpecialChars = 1
    }
    changePasswordDoneMessage_stdWrap {
        htmlSpecialChars = 1
    }
    cookieWarning_stdWrap {
        htmlSpecialChars = 1
    }
}

tt_content.table {
    20.innerStdWrap.parseFunc >
    20.innerStdWrap.htmlSpecialChars = 1
}

tt_content.bullets.20.split {
    1.parseFunc >
    1.htmlSpecialChars = 1

    2.parseFunc >
    2.htmlSpecialChars = 1
}


tt_content.image.20.1.altText {
    stripHtml >
    htmlSpecialChars = 1
}

tt_content.image.20.caption.1.1 {
    parseFunc >
    htmlSpecialChars = 1
}

Please note, that in case editors were allowed to edit HTML in your particular installation, that you need to adapt the TypoScript to allow HTML input again. Be aware however that your editors will have full control over HTML, which equals to having permission to create HTML content elements.

Credits: Thanks to Nils Juenemann and the security team member Georg Ringer who discovered and reported the issues.

 

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.

Cross-Site Scripting vulnerability in typolinks

Component Type: TYPO3 CMS

Release Date: December 15, 2015

 

Vulnerability Type: Cross-Site Scripting

Affected Versions: Versions 6.2.0 to 6.2.15, 7.0.0 to 7.6.0

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:O/RC:C

CVE: not assigned yet

Problem Description: All link fields within the TYPO3 installation are vulnerable to Cross-Site Scripting as authorized editors can insert javascript commands by using the url scheme “javascript:”.

Solution: Update to TYPO3 versions 6.2.16 or 7.6.1 that fix the problem described. By default now the typoLink() function disables the insecure url scheme “javascript:”.

Important note: If your TYPO3 installation is in need of that prefix you can re-enable the old behaviour by installing the extension javascript_handler.

Credits: Thanks to Oliver Hader who discovered and reported the issues.

 

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.

Cross-Site Scripting vulnerability in typolinks

Component Type: TYPO3 CMS

Release Date: December 15, 2015

 

Vulnerability Type: Cross-Site Scripting

Affected Versions: Versions 6.2.0 to 6.2.15, 7.0.0 to 7.6.0

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:O/RC:C

CVE: not assigned yet

Problem Description: All link fields within the TYPO3 installation are vulnerable to Cross-Site Scripting as authorized editors can insert javascript commands by using the url scheme “javascript:”.

Solution: Update to TYPO3 versions 6.2.16 or 7.6.1 that fix the problem described. By default now the typoLink() function disables the insecure url scheme “javascript:”.

Important note: If your TYPO3 installation is in need of that prefix you can re-enable the old behaviour by installing the extension javascript_handler.

Credits: Thanks to Oliver Hader who discovered and reported the issues.

 

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.

Multiple Cross-Site Scripting vulnerabilities in TYPO3 backend

Component Type: TYPO3 CMS

Release Date: December 15, 2015

 

Vulnerable subcomponent: Backend

Vulnerability Type: Cross-Site Scripting

Affected Versions: Versions 6.2.0 to 6.2.15, 7.0.0 to 7.6.0

Severity: Low

Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:N/I:P/A:N/E:F/RL:O/RC:C

CVE: not assigned yet

Problem Description: Failing to properly encode user input, several backend components are susceptible to Cross-Site Scripting, allowing authenticated editors to inject arbitrary HTML or JavaScript.

Solution: Update to TYPO3 versions 6.2.16 or 7.6.1 that fix the problem described.

Credits: Thanks to Markus Bucher, Corné Hannema, Heine Pedersen and Torben Jensen who discovered and reported the issues.

 

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.

Multiple Cross-Site Scripting vulnerabilities in TYPO3 backend

Component Type: TYPO3 CMS

Release Date: December 15, 2015

 

Vulnerable subcomponent: Backend

Vulnerability Type: Cross-Site Scripting

Affected Versions: Versions 6.2.0 to 6.2.15, 7.0.0 to 7.6.0

Severity: Low

Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:N/I:P/A:N/E:F/RL:O/RC:C

CVE: not assigned yet

Problem Description: Failing to properly encode user input, several backend components are susceptible to Cross-Site Scripting, allowing authenticated editors to inject arbitrary HTML or JavaScript.

Solution: Update to TYPO3 versions 6.2.16 or 7.6.1 that fix the problem described.

Credits: Thanks to Markus Bucher, Corné Hannema, Heine Pedersen and Torben Jensen who discovered and reported the issues.

 

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.

Cross-Site Scripting in TYPO3 component Extension Manager

Component Type: TYPO3 CMS

Release Date: December 15, 2015

 

Vulnerable subcomponent: Extension Manager

Vulnerability Type: Cross-Site Scripting

Affected Versions: Versions 6.2.0 to 6.2.15, 7.0.0 to 7.6.0

Severity: Low

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:O/RC:C

CVE: not assigned yet

Problem Description: Failing to properly HTML encode extension data during an extension installation, TYPO3 is vulnerable to Cross-Site Scripting.

Solution: Update to TYPO3 versions 6.2.16 or 7.6.1 that fix the problem described.

Credits: Thanks to the security team member Helmut Hummel who discovered and reported the issue.

 

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.

Cross-Site Scripting in TYPO3 component Extension Manager

Component Type: TYPO3 CMS

Release Date: December 15, 2015

 

Vulnerable subcomponent: Extension Manager

Vulnerability Type: Cross-Site Scripting

Affected Versions: Versions 6.2.0 to 6.2.15, 7.0.0 to 7.6.0

Severity: Low

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:O/RC:C

CVE: not assigned yet

Problem Description: Failing to properly HTML encode extension data during an extension installation, TYPO3 is vulnerable to Cross-Site Scripting.

Solution: Update to TYPO3 versions 6.2.16 or 7.6.1 that fix the problem described.

Credits: Thanks to the security team member Helmut Hummel who discovered and reported the issue.

 

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.

13 Million MacKeeper Users Hacked — 21 GB of Data Exposed

MacKeeper anti-virus company is making headlines today for its lax security that exposed the database of 13 Million Mac users’ records including names, email addresses, usernames, password hashes, IP addresses, phone numbers, and system information.

MacKeeper is a suite of software that claims to make Apple Macs more secure and stable, but today the anti-virus itself need some extra