Category Archives: Typo3

Typo3

Multiple Vulnerabilities in TYPO3 CMS

Component Type: TYPO3 CMS

Vulnerability Types: Denial of Service, Arbitrary Shell Execution

Overall Severity: Medium

Release Date: October 22, 2014

 

Vulnerable subcomponent: OpenID System Extension

Vulnerability Type: Denial of Service

Affected Versions: Versions 4.5.0 to 4.5.36, 4.7.0 to 4.7.19, 6.1.0 to 6.1.11 and 6.2.0 to 6.2.5

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:ND/RL:OF/RC:C

Related CVE: CVE-2013-4701

Problem Description: The OpenID library that is shipped with TYPO3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via XRDS data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. Affected are all TYPO3 installation with system extension openid installed and enabled.

Solution: Update to TYPO3 versions 4.5.37, 4.7.20, 6.1.12 or 6.2.6 that fix the problem described.

Solution: Alternatively disabling openid system extension also fixes the vulnerability in case an update is currently not possible. However it is unlikely but possible that other third party extensions use the OpenID library exposing this TYPO3 installation to this vulnerability again. Therefore updating is strongly recommended.

Solution: TYPO3 branches 4.6 and 6.0 are also affected by this vulnerability but have reached end of maintenance. We hereby provide patches for the these branches: 62357_4-6.diff, 62357_6-0.diff

Solution:Since the fix has also been committed to our git source code repository also in the 4.6 and 6.0 branches, updating your installation to the latest state of the according branch also fixes the vulnerability.

Credits: The vendor credits Kousuke Ebihara.

 

Vulnerable subcomponent: Swiftmailer library

Vulnerability Type: Arbitrary Shell Execution

Affected Versions: Versions 4.5.0 to 4.5.36, 4.7.0 to 4.7.19, 6.1.0 to 6.1.11 and 6.2.0 to 6.2.5

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:ND/RL:OF/RC:C

Related announcement: Swiftmailer release 5.2.1

Problem Description: The swiftmailer library in use allows to execute arbitrary shell commands if the “From” header comes from a non-trusted source and no “Return-Path” is configured. Affected are only TYPO3 installation the configuration option

$GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport'] 

is set to “sendmail”. Installations with the default configuration are not affected.

Solution: Update to TYPO3 versions 4.5.37, 4.7.20, 6.1.12 or 6.2.6 that fix the problem described.

Solution:TYPO3 branches 4.6 and 6.0 are also affected by this vulnerability but have reached end of maintenance. We hereby provide patches for the these branches: 59573_4-6.diff, 59573_6-0.diff

Solution: Since the fix has also been committed to our git source code repository also in the 4.6 and 6.0 branches, updating your installation to the latest state of the according branch also fixes the vulnerability.

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.

Multiple Vulnerabilities in TYPO3 CMS

Component Type: TYPO3 CMS

Vulnerability Types: Denial of Service, Arbitrary Shell Execution

Overall Severity: Medium

Release Date: October 22, 2014

 

Vulnerable subcomponent: OpenID System Extension

Vulnerability Type: Denial of Service

Affected Versions: Versions 4.5.0 to 4.5.36, 4.7.0 to 4.7.19, 6.1.0 to 6.1.11 and 6.2.0 to 6.2.5

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:ND/RL:OF/RC:C

Related CVE: CVE-2013-4701

Problem Description: The OpenID library that is shipped with TYPO3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via XRDS data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. Affected are all TYPO3 installation with system extension openid installed and enabled.

Solution: Update to TYPO3 versions 4.5.37, 4.7.20, 6.1.12 or 6.2.6 that fix the problem described.

Solution: Alternatively disabling openid system extension also fixes the vulnerability in case an update is currently not possible. However it is unlikely but possible that other third party extensions use the OpenID library exposing this TYPO3 installation to this vulnerability again. Therefore updating is strongly recommended.

Solution: TYPO3 branches 4.6 and 6.0 are also affected by this vulnerability but have reached end of maintenance. We hereby provide patches for the these branches: 62357_4-6.diff, 62357_6-0.diff

Solution:Since the fix has also been committed to our git source code repository also in the 4.6 and 6.0 branches, updating your installation to the latest state of the according branch also fixes the vulnerability.

Credits: The vendor credits Kousuke Ebihara.

 

Vulnerable subcomponent: Swiftmailer library

Vulnerability Type: Arbitrary Shell Execution

Affected Versions: Versions 4.5.0 to 4.5.36, 4.7.0 to 4.7.19, 6.1.0 to 6.1.11 and 6.2.0 to 6.2.5

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:ND/RL:OF/RC:C

Related announcement: Swiftmailer release 5.2.1

Problem Description: The swiftmailer library in use allows to execute arbitrary shell commands if the “From” header comes from a non-trusted source and no “Return-Path” is configured. Affected are only TYPO3 installation the configuration option

$GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport'] 

is set to “sendmail”. Installations with the default configuration are not affected.

Solution: Update to TYPO3 versions 4.5.37, 4.7.20, 6.1.12 or 6.2.6 that fix the problem described.

Solution:TYPO3 branches 4.6 and 6.0 are also affected by this vulnerability but have reached end of maintenance. We hereby provide patches for the these branches: 59573_4-6.diff, 59573_6-0.diff

Solution: Since the fix has also been committed to our git source code repository also in the 4.6 and 6.0 branches, updating your installation to the latest state of the according branch also fixes the vulnerability.

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.

Information Disclosure vulnerability in Dynamic Content Elements (dce)

Release Date: October 17, 2014

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: all versions of 0.7.x, 0.8.x, 0.9.x, 0.10.x, 0.11.4 and below of 0.11.x

Vulnerability Type: Information Disclosure

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:N/A:N/E:H/RL:OF/RC:C

Problem Description: The extension provides a functionality to check for extension updates. Along with this functionality, installation environment data is automatically reported to the infrastructure of the extension author without user interaction.

Solution: Updated version 0.11.5 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/dce/0.11.5/t3x/. The new extension version provides a configuration option to enable the described behaviour.

Credits: Credits go to Georg Ringer who discovered and reported the issue and Armin Vieweg who quickly responded & resolved this issue.

 

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

Improper Access Control vulnerability in extension fal_sftp (fal_sftp)

Release Date: October 17, 2014

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: 0.2.4, 0.2.5

Vulnerability Type: Improper Access Control

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C

Problem Description: Configured permissions of newly created files and folders for the sFTP driver are set incorrectly.

Solution: Updated version 0.2.6 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/fal_sftp/0.2.6/t3x/. Please check your existing setup and fix permission if needed! Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Jost Baron who discovered and reported the issue.

 

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

Denial of Service vulnerability in extension Calendar Base (cal)

Release Date: October 17, 2014

Bulletin Update: October 18, 2014 (added CVE)

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: all versions of 0.x.x, 1.0.x, 1.1.x, 1.2.x, 1.3.x, 1.4.x; 1.5.8 and below of 1.5.x; 1.6.0

Vulnerability Type: Denial of Service

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:POC/RL:OF/RC:C

CVE: CVE-2014-8325

Problem Description: User input is passed to PHP’s PCRE library without validating it beforehand. Depending on user input this may consume a tremendous amount of system resources.

Solution: Updated versions 1.5.9 (for TYPO3 CMS 4.5.5 – 6.0.99) and 1.6.1 (for TYPO3 CMS 6.1.0 – 6.2.99) are available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/cal/1.6.1/t3x/ and http://typo3.org/extensions/repository/download/cal/1.5.9/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Daniel Hahler and Bernd Schuhmacher who discovered and reported the issue.

 

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

Denial of Service vulnerability in extension Calendar Base (cal)

Release Date: October 17, 2014

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: all versions of 0.x.x, 1.0.x, 1.1.x, 1.2.x, 1.3.x, 1.4.x; 1.5.8 and below of 1.5.x; 1.6.0

Vulnerability Type: Denial of Service

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:POC/RL:OF/RC:C

Problem Description: User input is passed to PHP’s PCRE library without validating it beforehand. Depending on user input this may consume a tremendous amount of system resources.

Solution: Updated versions 1.5.9 (for TYPO3 CMS 4.5.5 – 6.0.99) and 1.6.1 (for TYPO3 CMS 6.1.0 – 6.2.99) are available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/cal/1.6.1/t3x/ and http://typo3.org/extensions/repository/download/cal/1.5.9/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Daniel Hahler and Bernd Schuhmacher who discovered and reported the issue.

 

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

Several vulnerabilities in extension phpMyAdmin (phpmyadmin)

Release Date: September 26, 2014

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 4.18.2 and below

Vulnerability Type: XSS, CSRF

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:P/I:P/A:N/E:ND/RL:O/RC:C (What’s that?)

References: PMASA-2014-8, PMASA-2014-10

Problem Description: With several usage actions it is possible to trigger XSS in various components. By deceiving a logged-in user to click on a crafted URL, it is possible to perform remote code execution and in some cases, create a root account due to a DOM based XSS vulnerability in the micro history feature.

Solution: An updated version 4.18.3 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/phpmyadmin/4.18.3/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: The vendor of the phpMyAdmin upstream software credits Ashutosh Dhundhara (PMASA-2014-8) and Olivier Beg (PMASA-2014-8). Thanks to Andreas Beutel for providing a TYPO3 extension package with an updated phpMyAdmin version.

 

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

Several vulnerabilities in extension JobControl (dmmjobcontrol)

Release Date: September 25, 2014

Bulletin update: October 6, 2014 (added CVEs)

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 2.14.0 and below

Vulnerability Type: Cross-Site Scripting, SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:A/I:P/A:N/E:H/RL:U/RC:C (What’s that?)

CVE: CVE-2014-7200 (XSS), CVE-2014-7201 (SQLi)

Problem Description: The extension fails to properly escape user input in SQL and HTML context.

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author is no longer maintaining this extension. Please uninstall and delete the extension folder from your installation.

Credits: Credits go to Hans-Martin Münch who discovered and reported the issues.

 

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

Several vulnerabilities in third party extensions

Release Date: September 02, 2014

Bulletin update: September 5, 2014 (added CVEs)

Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.

Please read the chapter in the Security Guide about the different types of Extension Security Bulletins.

All vulnerabilities affect third-party extensions. These extensions are not part of the TYPO3 default installation.

 

Extension: CWT Frontend Edit (cwt_feedit)

Affected Versions: 1.2.4 and all versions below

Vulnerability Type: Arbitrary Code Execution

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6231

Solution: An updated version 1.2.5 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/cwt_feedit/1.2.5/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Milan Altenburg who discovered and reported the issue.

 

Extension: LDAP (eu_ldap)

Affected Versions: 2.8.17 and all versions below

Vulnerability Type: Information Disclosure

Severity: Low

Suggested CVSS v2.0: AV:N/AC:H/Au:S/C:C/I:N/A:N/E:ND/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6232

Solution: An updated version 2.8.18 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/eu_ldap/2.8.18/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Florian Seirer who discovered and reported the issue.

 

Extension: Flat Manager (flatmgr)

Affected Versions: 2.7.9 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6233

Solution: An updated version 2.7.10 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/flatmgr/2.7.10/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Ingo Schmitt who discovered and reported the issue.

 

Extension: Open Graph protocol (jh_opengraphprotocol)

Affected Versions: 1.0.1 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6234

Solution: An updated version 1.0.2 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/jh_opengraphprotocol/1.0.2/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Heiko Kromm who discovered and reported the issue.

 

Extension: ke DomPDF (ke_dompdf)

Affected Versions: 0.0.3 and all versions below

Vulnerability Type: Remote Code Execution

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6235

Solution: An updated version 0.0.5 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/ke_dompdf/0.0.5/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Hendrik Nadler who discovered and reported the issue.

 

Extension: LumoNet PHP Include (lumophpinclude)

Affected Versions: 1.2.0 and all versions below

Vulnerability Type: Arbitrary Code Execution

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6236

Solution: An updated version 1.2.1 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/lumophpinclude/1.2.1/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Jost Baron who discovered and reported the issue.

 

Extension: News Pack (news_pack)

Affected Versions: 0.1.0 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C (What’s that?)

CVE: CVE-2014-6237

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Credits: Credits go to Frederic Gaus who discovered and reported the issue.

 

Extension: SB Folderdownload (sb_akronymmanager)

Affected Versions: 0.5.0 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C (What’s that?)

CVE: CVE-2014-6238

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

 

Extension: Address visualization with Google Maps (st_address_map)

Affected Versions: 0.3.5 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6239

Solution: An updated version 0.3.6 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/st_address_map/0.3.6/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Marc Bastian Heinrichs who discovered and reported the issue.

 

Extension: Google Sitemap (weeaar_googlesitemap)

Affected Versions: 0.4.3 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C (What’s that?)

CVE: CVE-2014-6240

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

 

Extension: wt_directory (wt_directory)

Affected Versions: 1.4.0 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6241

Solution: An updated version 1.4.1 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/wt_directory/1.4.1/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Marc Bastian Heinrichs who discovered and reported the issue.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

Several vulnerabilities in third party extensions

Release Date: September 02, 2014

Bulletin update: September 5, 2014 (added CVEs)

Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.

Please read the chapter in the Security Guide about the different types of Extension Security Bulletins.

All vulnerabilities affect third-party extensions. These extensions are not part of the TYPO3 default installation.

 

Extension: CWT Frontend Edit (cwt_feedit)

Affected Versions: 1.2.4 and all versions below

Vulnerability Type: Arbitrary Code Execution

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6231

Solution: An updated version 1.2.5 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/cwt_feedit/1.2.5/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Milan Altenburg who discovered and reported the issue.

 

Extension: LDAP (eu_ldap)

Affected Versions: 2.8.17 and all versions below

Vulnerability Type: Information Disclosure

Severity: Low

Suggested CVSS v2.0: AV:N/AC:H/Au:S/C:C/I:N/A:N/E:ND/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6232

Solution: An updated version 2.8.18 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/eu_ldap/2.8.18/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Florian Seirer who discovered and reported the issue.

 

Extension: Flat Manager (flatmgr)

Affected Versions: 2.7.9 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6233

Solution: An updated version 2.7.10 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/flatmgr/2.7.10/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Ingo Schmitt who discovered and reported the issue.

 

Extension: Open Graph protocol (jh_opengraphprotocol)

Affected Versions: 1.0.1 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6234

Solution: An updated version 1.0.2 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/jh_opengraphprotocol/1.0.2/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Heiko Kromm who discovered and reported the issue.

 

Extension: ke DomPDF (ke_dompdf)

Affected Versions: 0.0.3 and all versions below

Vulnerability Type: Remote Code Execution

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6235

Solution: An updated version 0.0.5 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/ke_dompdf/0.0.5/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Hendrik Nadler who discovered and reported the issue.

 

Extension: LumoNet PHP Include (lumophpinclude)

Affected Versions: 1.2.0 and all versions below

Vulnerability Type: Arbitrary Code Execution

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6236

Solution: An updated version 1.2.1 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/lumophpinclude/1.2.1/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Jost Baron who discovered and reported the issue.

 

Extension: News Pack (news_pack)

Affected Versions: 0.1.0 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C (What’s that?)

CVE: CVE-2014-6237

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

Credits: Credits go to Frederic Gaus who discovered and reported the issue.

 

Extension: SB Folderdownload (sb_akronymmanager)

Affected Versions: 0.5.0 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C (What’s that?)

CVE: CVE-2014-6238

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

 

Extension: Address visualization with Google Maps (st_address_map)

Affected Versions: 0.3.5 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6239

Solution: An updated version 0.3.6 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/st_address_map/0.3.6/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Marc Bastian Heinrichs who discovered and reported the issue.

 

Extension: Google Sitemap (weeaar_googlesitemap)

Affected Versions: 0.4.3 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C (What’s that?)

CVE: CVE-2014-6240

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author failed in providing a security fix for the reported vulnerability in a decent amount of time. Please uninstall and delete the extension folder from your installation.

 

Extension: wt_directory (wt_directory)

Affected Versions: 1.4.0 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

CVE: CVE-2014-6241

Solution: An updated version 1.4.1 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/download/wt_directory/1.4.1/t3x/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Marc Bastian Heinrichs who discovered and reported the issue.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.