=====================================================================
                                   CERT-Renater

                        Note d'Information No. 2009/VULN079
_____________________________________________________________________

DATE                      : 05/03/2009

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running Accessibility Glossary for TYPO3,
                             Calendar Base for TYPO3, Flat Manager for TYPO3.

======================================================================
http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-003/
______________________________________________________________________

TYPO3 Collective Security Bulletin TYPO3-SA-2009-003: Several
vulnerabilities in third party extensions

Release Date: March 05, 2009

Please read first: This Collective Security Bulletin (CSB) is a listing
of vulnerable extensions with neither significant download numbers, nor
other special importance amongst the TYPO3 Community. The intention of
CSBs is to reduce the workload of the TYPO3 Security Team and of the
maintainers of extensions with vulnerabilities. Nevertheless,
vulnerabilities in TYPO3 core or important extensions will still
get the well-known single Security Bulletin each.

Please read our buzz blog post, which has a detailed explanation on CSBs.

All vulnerabilities affect third party extensions. These extensions
are not part of the TYPO3 default installation.


Extension: Accessibility Glossary (a21glossary)
Affected Versions: 0.4.10 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be
vulnerable will no longer be available for download from the
TYPO3 Extension Repository. At the time of writing, we don't
know of a security update of the extension regarding the existing
vulnerability, since we have been unable to get in contact with the
author. For the time being please uninstall this extension and
delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide
a fixed version, the extension could return to the TYPO3 Extension
Repository.
Credits: Credits go to Peter Athmann, who discovered and reported
the issue.



Extension: Calendar Base (cal)
Affected Versions: 1.1.0 and all versions below
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: Medium
Solution: An update (version 1.1.1) is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/view/cal/1.1.1/.
Credits: Credits go to Marcel Greter, who discovered and
reported the issue.


Extension: Flat Manager (flatmgr)
Affected Versions: 1.9.15 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: An update (version 1.9.16) is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/view/flatmgr/1.9.16/.
Note: At the time of writing, the most recent version of Flat Manager
is version 1.9.18 which is available
at http://typo3.org/extensions/repository/view/flatmgr/1.9.18/.
Credits: Credits go to Malte Jansen, who discovered and reported the issue.



General advice: Follow the recommendations that are given in the TYPO3
Security Cookbook. Please subscribe to the typo3-announce mailing list
in order to receive future Security Bulletins via E-mail.


======================================================================

          =========================================================
          Les serveurs de référence du CERT-Renater
          http://www.urec.fr/securite
          http://www.cru.fr/securite
          http://www.renater.fr
          =========================================================
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +
          =========================================================
