Multiple vulnerabilities in third party extensions

2009-08-18T00:00:00
ID TYPO3-SA-2009-013
Type typo3
Reporter TYPO3 Association
Modified 2009-08-18T00:00:00

Description

Several vulnerabilities have been found in the following third party TYPO3 extensions: "AIRware Lexicon" (air_lexicon), "AST ZipCodeSearch" (ast_addresszipsearch), "Car" (car), "Event Registration" (event_registr), "Solidbase Bannermanagement" (SBbanner), "t3m_affiliate" (t3m_affiliate), "AJAX Chat" (vjchat)

Release Date: August 18, 2009

Please read first: This Collective Security Bulletin (CSB) is a listing of vulnerable extensions with neither significant download numbers, nor other special importance amongst the TYPO3 Community. The intention of CSBs is to reduce the workload of the TYPO3 Security Team and of the maintainers of extensions with vulnerabilities. Nevertheless, vulnerabilities in TYPO3 core or important extensions will still get the well-known single Security Bulletin each.

Please read our buzz blog post, which has a detailed explanation on CSBs.

All vulnerabilities affect third party extensions. These extensions are not part of the TYPO3 default installation.

Extension: AIRware Lexicon (air_lexicon)
Affected Versions: 0.0.1
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The author told us that he is unable to fix the issue in an appropriate time. Please uninstall and delete all files belonging to it from your TYPO3 installation.
Credits: Credits go to Christian Seifert, who discovered and reported the issue.

Extension: AST ZipCodeSearch (ast_addresszipsearch)
Affected Versions: 0.5.4
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Martin Schultes, who discovered and reported the issue.

Extension: Car (car)
Affected Versions: 0.1.0 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: An update (version 0.1.1) is available from the TYPO3 extension manager and at <http://typo3.org/extensions/repository/view/car/0.1.1/>.
Credits: Credits go to Georg Ringer, who discovered and reported the issue.

Extension: Event Registration (event_registr)
Affected Versions: 1.0.0 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The author wasn't able to provide a fixed version within the timeframe specified in the TYPO3 Extension Security Policy. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Georg Ringer, who discovered and reported the issue.

Extension: Solidbase Bannermanagement (SBbanner)
Affected Versions: 1.0.1
Vulnerability Type: Blind SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to TYPO3 Security Team member Marcus Krause, who discovered and reported the issue.

Extension: t3m_affiliate (t3m_affiliate)
Affected Versions: 0.5.0
Vulnerability Type: SQL Injection
Severity: High
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. At the time of writing, we don't know of a security update of the extension regarding the existing vulnerability, since we have been unable to get in contact with the author. For the time being please uninstall this extension and delete all files belonging to it from your TYPO3 installation.
Note: Should the author decide to reply to our request and provide a fixed version, the extension could return to the TYPO3 Extension Repository.
Credits: Credits go to Roland Obermayer, who discovered and reported the issue.

Extension: AJAX Chat (vjchat)
Affected Versions: 0.3.2 and all versions below
Vulnerability Type: SQL Injection
Severity: High
Solution: An update (version 0.3.3) is available from the TYPO3 extension manager and at <http://typo3.org/extensions/repository/view/vjchat/0.3.3/>.
Credits: Credits go to Vincent Tietz, who discovered and reported the issue.

General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to the typo3-announce mailing list in order to receive future Security Bulletins via E-mail.