
====================================================================

                               CERT-Renater

                    Note d'Information No. 2016/VULN154
_____________________________________________________________________

DATE                : 13/04/2016

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Samba versions prior to 4.4.2,
                                     4.3.8, 4.2.11.

======================================================================
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-009
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-010
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-011
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-012
_____________________________________________________________________

TYPO3-CORE-SA-2016-009: Cross-Site Scripting in TYPO3 Backend

April 12, 2016

Category: TYPO3 CMS
Author: Helmut Hummel
Keywords: Backend, Cross-Site Scripting, XSS

It has been discovered, that TYPO3 is susceptible to Cross-Site Scripting.

Component Type: TYPO3 CMS

Release Date: April 12, 2016

Vulnerable subcomponent: Backend

Vulnerability Type: Cross-Site Scripting

Affected Versions: Versions 6.2.0 to 6.2.19, 7.6.0 to 7.6.4 and 8.0.0

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:P/RL:O/RC:C

CVE: not assigned yet

Problem Description: Failing to properly encode user input, some
backend components are vulnerable to Cross-Site Scripting. A valid
backend user account is needed to exploit this vulnerability.

Solution: Update to TYPO3 versions 6.2.20, 7.6.5 or 8.0.1 that fix the
problem described.

Credits: Thanks to Georg Ringer, Nicole Cordes and Alexander Grein who
discovered and reported the issues.

General Advice: Follow the recommendations that are given in the TYPO3
Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you
can easily look them up on our review system.

- 
-------------------------------------------------------------------------------

TYPO3-CORE-SA-2016-010: Arbitrary File Disclosure in Form Component

April 12, 2016

Category: TYPO3 CMS
Author: Helmut Hummel
Keywords: Arbitrary File Disclosure, Form

It has been discovered, that TYPO3 Form Component is susceptible to
Arbitrary File Disclosure.

Component Type: TYPO3 CMS

Release Date: April 12, 2016

Vulnerable subcomponent: Form

Vulnerability Type: Arbitrary File Disclosure

Affected Versions: Versions 6.2.0 to 6.2.19

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:C/I:N/A:N/E:P/RL:O/RC:C

CVE: not assigned yet

Problem Description: Failing to properly validate user input, the form
component is susceptible to Arbitrary File Disclosure. A valid backend
user account is needed to exploit this vulnerability. Only forms are
vulnerable, which contain upload fields.

Solution: Update to TYPO3 versions 6.2.20 that fix the problem
described.

Credits: Thanks to Gerrit Venema who discovered and reported the issues.

General Advice: Follow the recommendations that are given in the TYPO3
Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you
can easily look them up on our review system.

- 
-------------------------------------------------------------------------------

TYPO3-CORE-SA-2016-011: Authentication Bypass in TYPO3 CMS

April 12, 2016

Category: TYPO3
CMS Author: Nicole Cordes
Keywords: Authentication Bypass, Core

It has been discovered, that TYPO3 CMS is vulnerable to Authentication 
Bypass.

Component Type: TYPO3 CMS

Release Date: April 12, 2016

Vulnerable subcomponent: Authentication

Vulnerability Type: Authentication Bypass

Affected Versions: Versions 6.2.0 to 6.2.19, 7.6.0 to 7.6.4 and 8.0.0

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:P/RL:O/RC:C

CVE: not assigned yet

Problem Description: The default authentication service misses to
invalidate empty strings as password. Therefore it is possible to
authenticate backend and frontend users without password set in the
database.

Solution: Update to TYPO3 versions 6.2.20, 7.6.5 or 8.0.1 that fix the
problem described.

Note: TYPO3 does not allow to create user accounts without a password.
Your TYPO3 installation might only be affected if there is a third
party component creating user accounts without password by directly
manipulating the database.

Credits: Thanks to Kevin Ditscheid who discovered and reported the
issue.

General Advice: Follow the recommendations that are given in the TYPO3
Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you
can easily look them up on our review system.

- 
-------------------------------------------------------------------------------

TYPO3-CORE-SA-2016-012: Privilege Escalation in TYPO3 CMS

April 12, 2016

Category: TYPO3 CMS

Author: Helmut Hummel

Keywords: Information Disclosure, Version

It has been discovered, that TYPO3 CMS is vulnerable to Privilege
Escalation.

Component Type: TYPO3 CMS

Release Date: April 12, 2016

Vulnerable subcomponent: Version

Vulnerability Type: Privilege Escalation

Affected Versions: Versions 6.2.0 to 6.2.19, 7.6.0 to 7.6.4 and 8.0.0

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:P/RL:O/RC:C

CVE: not assigned yet

Problem Description: The workspace/ version preview link created by a
privileged (backend) user could be abused to obtain certain editing
permission, if the admin panel is configured to be shown. A valid
preview link is required to exploit this vulnerability.

Solution: Update to TYPO3 versions 6.2.20, 7.6.5 or 8.0.1 that fix the
problem described.

Credits: Thanks to Helmut Hummel who discovered and reported the issue.

General Advice: Follow the recommendations that are given in the TYPO3
Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you
can easily look them up on our review system.


==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================



