SQL Injection vulnerabilities in extension "WEC Discussion Forum" (wec_discussion)

ID TYPO3-SA-2011-003
Type typo3
Reporter TYPO3 Association
Modified 2011-04-07T00:00:00


It has been discovered that the extension WEC Discussion Forum (wec_discussion) is vulnerable to SQL Injection.

Release Date: April 7, 2011

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: Version 2.1.0 and all versions below

Vulnerability Type: SQL Injection

Severity: High

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C (What's that?)

Problem Description: Failing to properly sanitize user-supplied input the extension is open to SQL Injection attacks. The vulnerabilities allow website visitors to inject arbitrary code in database queries.

Solution: An updated version 2.1.1 is available from the TYPO3 extension manager and at<http://typo3.org/extensions/repository/view/wec_discussion/2.1.1/>. Users of the extension are advised to update the extension as soon as possible.

Note: The vulnerabilities are being exploited in the wild. Please update the extension wec_discussion immediately when being used!

Credits: Credits go to Matthias Hunstock who discovered and reported the issue and TYPO3 Security Team members Sebastian Böttger, Helmut Hummel und Marcus Krause for preparing the security fix.

General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to thetypo3-announce mailing list to receive future Security Bulletins via E-mail.