=====================================================================
                                   CERT-Renater

                        Note d'Information No. 2008/VULN464
_____________________________________________________________________

DATE                      : 24/10/2008

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running TYPO3 third party extensions.

======================================================================
http://typo3.org/teams/security/security-bulletins/typo3-20081020-1/
______________________________________________________________________

TYPO3 Collective Security Bulletin TYPO3-20081020-1:
Several vulnerabilities in third party extensions

Please read first: This Collective Security Bulletin (CSB) is a listing
of vulnerable extensions with neither significant download numbers, nor
other special importance amongst the TYPO3 Community. The intention of
CSBs is to reduce the workload of the TYPO3 Security Team and of the
maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities
in TYPO3 core or important extensions will still get the well-known single
Security Bulletin each.

Please read our buzz blog post, which has a detailed explanation on CSBs.

All vulnerabilities affect third party extensions. These extensions are
not part of the TYPO3 default installation.



Extension: JobControl (dmmjobcontrol)
Affected Versions: 1.15.4 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: An update (version 1.15.5) is available from the TYPO3 extension
manager and at typo3.org/extensions/repository/view/dmmjobcontrol/1.15.5/.
Credits: Credits go to Max Beutel, who discovered and reported the issue.



Extension: Econda Plugin (econda)
Affected Versions: 0.0.2 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: An update (version 0.0.4) is available from the TYPO3 extension
manager and at typo3.org/extensions/repository/view/econda/0.0.4/.
Credits: Credits go to Oliver Klee, who discovered and reported the issue.



Extension: Frontend Users View (feusersview)
Affected Versions: 0.1.6 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: Versions of this extension that are known to be vulnerable will
no longer be available for download from the TYPO3 Extension Repository.
At the time of writing, we don't know of a security update of the extension
regarding the existing vulnerability, since we have been unable to get in
contact with the author. For the time being please uninstall this extension
and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed
version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Georg Ringer, who discovered and reported the issue.



Extension: Mannschaftsliste (kiddog_playerlist)
Affected Versions: 1.0.3 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: The extension author has informed us that he is not able to
fix the reported vulnerability in the near future. For the time being
please uninstall this extension and delete all files belonging to it
from your TYPO3 installation. The extension won't be available for
download from the TYPO3 Extension Repository until it has been reviewed.
Credits: Credits go to Georg Ringer and Security Team member Marcus
Krause, who discovered and reported the issue.



Extension: M1 Intern (m1_intern)
Affected Versions: 1.0.0
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: The extension is no longer maintained by the author. Please
uninstall this extension and delete all files belonging to it from your
TYPO3 installation. The extension won't be available for download from
the TYPO3 Extension Repository until it has been reviewed.
Credits: Credits go to Oliver Klee, who discovered and reported the issue.



Extension: Simple survey (simplesurvey)
Affected Versions: 1.7.0 and all versions below
Vulnerability Type: SQL Injection
Severity: HIGH
Solution: An update (version 1.7.1) is available from the TYPO3 extension
manager and at typo3.org/extensions/repository/view/simplesurvey/1.7.1/.
Note: At the time of writing, the most recent version of Simple survey is version
1.8.1 which is available at typo3.org/extensions/repository/view/simplesurvey/1.8.1/.
Credits: Credits go to Andreas Bouché, who discovered and reported the issue.



Extension: Page Improvements (sm_pageimprovements)
Affected Versions: 1.1.0 and all versions below
Vulnerability Type: Cross-Site Scripting
Severity: Medium
Solution: An update (version 0.2.0) is available from the TYPO3 extension
manager and at typo3.org/extensions/repository/view/sm_pageimprovements/0.2.0/.
Note: At the time of writing, the most recent version of Page Improvements
is version 0.3.0 which is available at
typo3.org/extensions/repository/view/sm_pageimprovements/0.3.0/
Please mind the wrong versioning scheme - extension version 0.3.0 is the
most recent one and includes the security fix.
Credits: Credits go to Security Team member Marcus Krause, who discovered
and reported the issue.



General advice: Follow the recommendations that are given in the TYPO3 Security
Cookbook. Please subscribe to the typo3-announce mailing list in order to
receive future Security Bulletins via E-mail.

======================================================================

          =========================================================
          Les serveurs de référence du CERT-Renater
          http://www.urec.fr/securite
          http://www.cru.fr/securite
          http://www.renater.fr
          =========================================================
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +
          =========================================================




