Secunia Security Advisory - Two vulnerabilities have been reported in TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks, and by malicious users to compromise a vulnerable system.
974f174d5905da48b34d650d2e8604c5d2ff22bb6970817e6adb817aebb0733f
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_security_specialist/
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
International Partner Manager - Project Sales in the IT-Security
Industry:
http://corporate.secunia.com/about_secunia/64/
----------------------------------------------------------------------
TITLE:
TYPO3 File Upload and Cross-Site Scripting Vulnerabilities
SECUNIA ADVISORY ID:
SA30619
VERIFY ADVISORY:
http://secunia.com/advisories/30619/
CRITICAL:
Moderately critical
IMPACT:
Cross Site Scripting, System access
WHERE:
>From remote
SOFTWARE:
TYPO3 3.x
http://secunia.com/product/1190/
TYPO3 4.x
http://secunia.com/product/12113/
DESCRIPTION:
Two vulnerabilities have been reported in TYPO3, which can be
exploited by malicious people to conduct cross-site scripting
attacks, and by malicious users to compromise a vulnerable system.
1) The vulnerability is caused due to an error in the handling of
file uploads, if a filename has multiple file extensions (e.g.
"file.php.1") or starts with a dot character (e.g. ".htaccess"). This
can be exploited to execute arbitrary code.
Successful exploitation of this vulnerability requires a certain
server configuration. It also requires either valid backend user
credentials and access to filemounts, or that frontend plugins using
"t3lib_div::verifyFilenameAgainstDenyPattern()" or "processFiles()"
to handle file uploads are installed.
2) Input passed in unspecified parameters to fe_adminlib.inc is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.
Successful exploitation of this vulnerability requires that a
frontend extension based on fe_adminlib.inc is installed - e.g.
direct_mail_subscription, feuser_admin, or kb_md5fepw.
The vulnerabilities are reported in all 3.x versions, 4.0.x versions
below 4.0.9, 4.1.x versions below 4.1.7, and in 4.2.0.
SOLUTION:
Update to version 4.0.9, 4.1.7, or 4.2.1.
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Michiel Roos and Marcus Krause.
2) The vendor credits Christian Seifert, Jeroen van Iddekinge, and
Arnd Messer.
ORIGINAL ADVISORY:
TYPO3-20080611-1:
http://typo3.org/teams/security/security-bulletins/typo3-20080611-1/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------