Multiple vulnerabilities in extension WEC Discussion Forum (wec_discussion)

2008-07-01T00:00:00
ID TYPO3-20080701-4
Type typo3
Reporter TYPO3 Association
Modified 2008-07-01T00:00:00

Description

It has been discovered that the extension WEC Discussion Forum (wec_discussion) is open to multiple security issues.

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: Version 1.6.2 and all versions below

Vulnerability Type: Arbitrary Code Execution, Cross Site Scripting

Severity: Medium

Problem Description: Failing to validate certain file types, makes it possible to execute arbitrary code. Failing to filter user input the extension is susceptible to multiple ways of Cross Site Scripting (XSS) making it possible to execute arbitrary JavaScript.

Solution: An updated version 1.6.3 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/wec_discussion/1.6.3/. Users of the extension are advised to update the extension as soon as possible.

General advice: Follow the recommendations that are given in the <media 800 - external-link-new-window>TYPO3 Security Cookbook</media>. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

Credits: Credits go to Markus Angerer who discovered one of the issues. Furthermore the TYPO3 Security Team wishes to thank the extension author Dave Slayback for fixing the issues.