Release Date: September 30, 2015
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: version 7.0.1 and below
Vulnerability Type: Information Disclosure
Severity: Low
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:O/RC:C (What’s that?)
Problem Description: The extension fails to ensure TYPO3 user authentication and will output the user name of the PHP process. In certain server setups, when the user of the PHP process can also access the database without password, it is possible to perform database operations with the permissions of this user. The extension t3adminer must only be present in the TYPO3 installation but does not need to be activated to exploit this vulnerability.
Solution: Updated versions 1.4.1 and 7.0.2 are available from the TYPO3 Extension Manager and at http://typo3.org/extensions/repository/download/t3adminer/1.4.1/t3x/ and http://typo3.org/extensions/repository/download/t3adminer/7.0.2/t3x/. Users of the extension are advised to update the extension as soon as possible.
Note: In general the TYPO3 Security Team recommends to not use any extensions that bundle database or file management tools on production TYPO3 websites.
Credits: Credits go to Harald Amelung who discovered and reported the issue.
General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.