
=====================================================================

                           CERT-Renater

               Note d'Information No. 2014/VULN176
_____________________________________________________________________

DATE                : 08/09/2014

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S):  Systems running cwt_feedit, eu_ldap, flatmgr,
                       jh_opengraphprotocol, ke_dompdf, lumophpinclude,
                       news_pack, sb_akronymmanager, st_address_ma,
                       weeaar_googlesitemap, wt_directory for TYPO3.

======================================================================
http://typo3.org/support/teamssecuritysecurity-bulletins/security-bulletins-single-view/article/several-vulnerabilities-in-third-party-extensions-4/
______________________________________________________________________


TYPO3-EXT-SA-2014-010: Several vulnerabilities in third party extensions

September 02, 2014

Category: TYPO3 Extension
Author: Marcus Krause
Keywords: TYPO3, security, TYPO3-EXT-SA-2014-010, extension, cwt_feedit,
eu_ldap, flatmgr, jh_opengraphprotocol, ke_dompdf, lumophpinclude,
news_pack, sb_akronymmanager, st_address_ma, weeaar_googlesitemap,.
wt_directory

Several vulnerabilities have been found in the following third-party
TYPO3 extensions: cwt_feedit, eu_ldap, flatmgr, jh_opengraphprotocol,
ke_dompdf, lumophpinclude, news_pack, sb_akronymmanager, st_address_ma,
weeaar_googlesitemap,. wt_directory

Release Date: September 02, 2014

Bulletin update: September 5, 2014 (added CVEs)

Please read first: This Collective Security Bulletin (CSB) is a listing
of vulnerable extensions with neither significant download numbers, nor
other special importance amongst the TYPO3 Community. The intention of
CSBs is to reduce the workload of the TYPO3 Security Team and of the
maintainers of extensions with vulnerabilities. Nevertheless,
vulnerabilities in TYPO3 core or important extensions will still get
the well-known single Security Bulletin each.

Please read the chapter in the Security Guide about the different types
of Extension Security Bulletins.

All vulnerabilities affect third-party extensions. These extensions are
not part of the TYPO3 default installation.



Extension: CWT Frontend Edit (cwt_feedit)

Affected Versions: 1.2.4 and all versions below

Vulnerability Type: Arbitrary Code Execution

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:O/RC:C (What's that?)

CVE: CVE-2014-6231

Solution: An updated version 1.2.5 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/download/cwt_feedit/1.2.5/t3x/.
Users of the extension are advised to update the extension as soon as
possible.

Credits: Credits go to Milan Altenburg who discovered and reported the
issue.



Extension: LDAP (eu_ldap)

Affected Versions: 2.8.17 and all versions below

Vulnerability Type: Information Disclosure

Severity: Low

Suggested CVSS v2.0: AV:N/AC:H/Au:S/C:C/I:N/A:N/E:ND/RL:O/RC:C (What's
that?)

CVE: CVE-2014-6232

Solution: An updated version 2.8.18 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/download/eu_ldap/2.8.18/t3x/.
Users of the extension are advised to update the extension as soon as
possible.

Credits: Credits go to Florian Seirer who discovered and reported the
issue.



Extension: Flat Manager (flatmgr)

Affected Versions: 2.7.9 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What's that?)

CVE: CVE-2014-6233

Solution: An updated version 2.7.10 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/download/flatmgr/2.7.10/t3x/.
Users of the extension are advised to update the extension as soon as
possible.

Credits: Credits go to Ingo Schmitt who discovered and reported the
issue.



Extension: Open Graph protocol (jh_opengraphprotocol)

Affected Versions: 1.0.1 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:F/RL:O/RC:C (What's that?)

CVE: CVE-2014-6234

Solution: An updated version 1.0.2 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/download/jh_opengraphprotocol/1.0.2/t3x/.
Users of the extension are advised to update the extension
as soon as possible.

Credits: Credits go to Heiko Kromm who discovered and reported the
issue.



Extension: ke DomPDF (ke_dompdf)

Affected Versions: 0.0.3 and all versions below

Vulnerability Type: Remote Code Execution

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:O/RC:C (What's that?)

CVE: CVE-2014-6235

Solution: An updated version 0.0.5 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/download/ke_dompdf/0.0.5/t3x/.
Users of the extension are advised to update the extension as soon as
possible.

Credits: Credits go to Hendrik Nadler who discovered and reported the
issue.



Extension: LumoNet PHP Include (lumophpinclude)

Affected Versions: 1.2.0 and all versions below

Vulnerability Type: Arbitrary Code Execution

Severity: Critical

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:O/RC:C (What's that?)

CVE: CVE-2014-6236

Solution: An updated version 1.2.1 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/download/lumophpinclude/1.2.1/t3x/.
Users of the extension are advised to update the extension as
soon as possible.

Credits: Credits go to Jost Baron who discovered and reported the issue.



Extension: News Pack (news_pack)

Affected Versions: 0.1.0 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C (What's that?)

CVE: CVE-2014-6237

Solution: Versions of this extension that are known to be vulnerable
will no longer be available for download from the TYPO3 Extension
Repository. The extension author failed in providing a security fix for
the reported vulnerability in a decent amount of time. Please uninstall
and delete the extension folder from your installation.

Credits: Credits go to Frederic Gaus who discovered and reported the
issue.



Extension: SB Folderdownload (sb_akronymmanager)

Affected Versions: 0.5.0 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C (What's that?)

CVE: CVE-2014-6238

Solution: Versions of this extension that are known to be vulnerable
will no longer be available for download from the TYPO3 Extension
Repository. The extension author failed in providing a security fix for
the reported vulnerability in a decent amount of time. Please uninstall
and delete the extension folder from your installation.



Extension: Address visualization with Google Maps (st_address_map)

Affected Versions: 0.3.5 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What's that?)

CVE: CVE-2014-6239

Solution: An updated version 0.3.6 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/download/st_address_map/0.3.6/t3x/.
Users of the extension are advised to update the extension as
soon as possible.

Credits: Credits go to Marc Bastian Heinrichs who discovered and
reported the issue.



Extension: Google Sitemap (weeaar_googlesitemap)

Affected Versions: 0.4.3 and all versions below

Vulnerability Type: Cross-Site Scripting

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C (What's that?)

CVE: CVE-2014-6240

Solution: Versions of this extension that are known to be vulnerable
will no longer be available for download from the TYPO3 Extension
Repository. The extension author failed in providing a security fix for
the reported vulnerability in a decent amount of time. Please uninstall
and delete the extension folder from your installation.



Extension: wt_directory (wt_directory)

Affected Versions: 1.4.0 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What's that?)

CVE: CVE-2014-6241

Solution: An updated version 1.4.1 is available from the TYPO3
extension manager and at
http://typo3.org/extensions/repository/download/wt_directory/1.4.1/t3x/.
Users of the extension are advised to update the extension as
soon as possible.

Credits: Credits go to Marc Bastian Heinrichs who discovered and
reported the issue.



General advice: Follow the recommendations that are given in the TYPO3
Security Guide. Please subscribe to the typo3-announce mailing list to
receive future Security Bulletins via E-mail.


=========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================
