Multiple vulnerabilities in extension WT Gallery (wt_gallery)

2008-05-13T00:00:00
ID TYPO3-20080513-1
Type typo3
Reporter TYPO3 Association
Modified 2008-05-13T00:00:00

Description

It has been discovered that the extension wt_gallery is susceptible to Path Traversal and Cross Site Scripting (XSS) attacks. Besides that, it may disclose sensitive information.

Component Type: Third party extension. This extension is not part of the TYPO3 default installation.

Affected Versions: Version 2.6.2 and below (Cross Site Scripting), Version 2.5.0 and below (Path Traversal, Information Disclosure, Cross Site Scripting).

Vulnerability Type: Path Traversal and Information Disclosure, Cross Site Scripting

Severity: High

Problem Description: A problem has been discovered in the wt_gallery extension, which allows a user to download arbitrary image-files from and may disclose the directory structure of the server. Cross Site Scripting is also possible by injecting HTML or JavaScript code because the extension fails to properly sanitize user-supplied input.

Solution: A fixed version 2.6.3 is available in the extension repository and at
http://typo3.org/extensions/repository/view/wt_gallery/2.6.3/. Users of the extension wt_gallery are advised to update the extension as soon as possible.

General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

Credits: Credits go to security team members Helmut Hummel and Henning Pingel, who discovered the issues. Furthermore the TYPO3 Security Team wishes to thank the extension author Alexander Kellner for fixing the issue.