===================================================================== CERT-Renater Note d'Information No. 2009/VULN421 _____________________________________________________________________ DATE : 20/10/2009 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running Apache Solr Search for TYPO3, Random Images for TYPO3, Flagbit Filebase for TYPO3, freeCap CAPTCHA for TYPO3. ====================================================================== http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-014/ ______________________________________________________________________ - - ----------------------------------------------------------------------- TYPO3 Collective Security Bulletin TYPO3-SA-2009-14: Several vulnerabilities in third party extensions Release Date: Oktober 20, 2009 Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each. Please read our buzz blog post, which has a detailed explanation on CSBs. All vulnerabilities affect third party extensions. These extensions are not part of the TYPO3 default installation. Extension: Apache Solr Search (solr) Affected Versions: 1.0.0 Vulnerability Type: Cross-Site Scripting (XSS) Severity: High Solution: An update (version 1.0.1) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/solr/1.0.1/. Credits: Credits go to Marcus Krause, who discovered and reported the issue. Extension: Random Images (maag_randomimage) Affected Versions: 1.6.4 and all versions below Vulnerability Type: Remote Shell Command Execution Severity: High Solution: An update (version 1.6.5) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/maag_randomimage/1.6.5/. Credits: Credits go to Jan Hacker, who discovered and reported the issue. Extension: Flagbit Filebase (fb_filebase) Affected Versions: 0.1.0 Vulnerability Type: Blind SQL Injection Severity: High Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation. Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository. Credits: Credits go to Alexander Grein, who discovered and reported the issue. Extension: freeCap CAPTCHA (sr_freecap) Affected Versions: 1.2.0 and all versions below Vulnerability Type: Broken Session Handling Severity: Low Solution: An update (version 1.2.2) is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/sr_freecap/1.2.2/. Credits: Credits go to Wolo Wolski, who discovered and reported the issue. General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to the typo3-announce mailing list in order to receive future Security Bulletins via E-mail. ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 151 bd de l'Hopital | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================