SQL Injection in extension "Library for Frontend plugins" (sg_zfelib)

2008-05-27T00:00:00
ID TYPO3-20080527-2
Type typo3
Reporter TYPO3 Association
Modified 2008-05-27T00:00:00

Description

It has been discovered that the extension "Library for Frontend plugins" (sg_zfelib) is susceptible to SQL Injections.

Component Type: Third party extension. This extension is not part of the TYPO3 default installation.

Affected Versions: Version 1.1.512 and below

Vulnerability Type: SQL Injection

Severity: High

Problem Description: Failing to filter user input the extension is susceptible to SQL Injections making it possible to get read access to the database.

Solution: An updated version 1.1.513 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/sg_zfelib/1.1.513/. Users of the extension are advised to update the extension as soon as possible.

Additional Note: As the mentioned extension is a library which provides functionality for other extensions, all extensions that depend on sg_zfelib (version 1.1.512 and below) will inherit the vulnerability of sg_zfelib.

Extensions based on sg_zfelib are for example: sg_newsplus, sg_address, sg_avmedia, sg_event, sg_genealogy, sg_glossary, sg_newsletter, sg_prodprom, sg_smallads, sg_userdata, sg_filelist, sg_dictionary.

This is not a complete list. More extensions using sg_zfelib may exist that are for example not listed on TER.

General advice: *Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.*

Credits: Credits go to Philipp Rocholl and Wassim Amouri, who discovered and reported the issues. Furthermore the TYPO3 Security Team wishes to thank the extension author Stefan Geith for fixing the extension.