=====================================================================
CERT-Renater
Note d'Information No. 2009/VULN490
_____________________________________________________________________
DATE : 02/12/2009
HARDWARE PLATFORM(S) : /
OPERATING SYSTEM(S) : Systems running Calendar Base for TYPO3,
Direct Mail for TYPO3, [AN] Search it! for TYPO3,
kk_downloader for TYPO3, lt_basetag for TYPO3,
Trips for TYPO3, simple Glossar for TYPO3,
TW Productfinder for TYPO3, DB Integration for TYPO3.
======================================================================
http://lists.typo3.org/pipermail/typo3-announce/2009/000137.html
______________________________________________________________________
Dear users of TYPO3,
Security vulnerabilities have been discovered in following third party TYPO3
extensions:
"Calendar Base" (cal)
"Direct Mail" (direct_mail)
"[AN] Search it!" (an_searchit)
"Simple download-system with counter and categories" (kk_downloader)
"Automatic Base Tags for RealUrl" (lt_basetag)
"Trips" (mchtrips)
"simple Glossar" (simple_glossar)
"TW Productfinder" (tw_productfinder)
"DB Integration" (wfqbe)
For further information on the issue in extension "Calendar Base" (cal),
please read the related advisory TYPO3-SA-2009-019 that was published today:
For further information on the issue in extension "Direct
Mail" (direct_mail), please read the related advisory TYPO3-SA-2009-018 that
was published today:
For further information on all CSB (Collective Security Bulletin) issues,
please read the related advisory TYPO3-SA-2009-017 that was published today:
In general, the TYPO3 Security Team recommends to read the following pages:
The TYPO3 Security Cookbook:
Make sure you are subscribed to the TYPO3 Announce List:
See all TYPO3 security advisories:
Regards,
Marcus Krause
Member of the TYPO3 Security Team
--
TYPO3 Security Team homepage: http://typo3.org/teams/security/
E-Mail: security at typo3.org
Please note: when replying to this e-mail, please leave the header intact.
======================================================================
=========================================================
Les serveurs de référence du CERT-Renater
http://www.urec.fr/securite
http://www.cru.fr/securite
http://www.renater.fr
=========================================================
+ CERT-RENATER | tel : 01-53-94-20-44 +
+ 151 bd de l'Hopital | fax : 01-53-94-20-41 +
+ 75013 Paris | email: certsvp@renater.fr +
=========================================================