Cross-Site Scripting in extension "News system" (news)

2015-09-30T00:00:00
ID TYPO3-EXT-SA-2015-017
Type typo3
Reporter TYPO3 Association
Modified 2015-09-30T00:00:00

Description

It has been discovered that the extension "News system" (news) is susceptible to Cross-Site Scripting.

Release Date: September 30, 2015

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 3.2.1 and below

Vulnerability Type: Cross-Site Scripting

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:F/RL:O/RC:C (What's that?)

CVE: not assigned yet

Problem Description: The extension fails to properly encode user input in the paginate widget. This is only exploitable when extension cooluri is used or if realurl is used and the configuration option doNotRawUrlEncodeParameterNames is enabled.

Solution: An updated version 3.2.2 is available from the TYPO3 Extension Manager and at <http://typo3.org/extensions/repository/download/news/3.2.2/t3x/>. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Marc Willmann who reported the issue.

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.