Bulgaria passes Law that mandates Government Software must be Open Source

Do you have any idea what the software you have installed is doing stealthily in the background? If it’s not an open source software, can you find out?

Usually, the answer is no.

After Edward Snowden’s revelations, it’s clear that how desperately government agencies wants to put secret backdoors in your network, devices, and software.
<!– adsense –>
However, Bulgaria has come forward with

Insecure Unserialize in extension "Page path" (pagepath)

Release Date: July 7, 2016

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 1.0.3 and below

Vulnerability Type: Insecure Unserialize

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

Problem Description: The extension unserializes strings from untrusted source.

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension is no longer maintained and the author will not provide a security fix for the reported vulnerability. Please uninstall and delete the extension from your installation.

Credits: Credits go to the security team member Helmut Hummel who discovered and reported the vulnerability.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

Cross-Site Scripting in extension "CCDebug" (cc_debug)

Release Date: July 7, 2016

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 1.0.0 and below

Vulnerability Type: Cross-Site Scripting

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

Problem Description: The extension fails to properly sanitize user input.

Solution: An updated version 1.0.1 is available from the TYPO3 Extension Manager and at https://typo3.org/extensions/repository/download/cc_debug/1.0.1/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Sebastian Fischer who discovered and reported the vulnerability.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.