---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: TYPO3 File Upload and Cross-Site Scripting Vulnerabilities SECUNIA ADVISORY ID: SA30619 VERIFY ADVISORY: http://secunia.com/advisories/30619/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting, System access WHERE: >From remote SOFTWARE: TYPO3 3.x http://secunia.com/product/1190/ TYPO3 4.x http://secunia.com/product/12113/ DESCRIPTION: Two vulnerabilities have been reported in TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks, and by malicious users to compromise a vulnerable system. 1) The vulnerability is caused due to an error in the handling of file uploads, if a filename has multiple file extensions (e.g. "file.php.1") or starts with a dot character (e.g. ".htaccess"). This can be exploited to execute arbitrary code. Successful exploitation of this vulnerability requires a certain server configuration. It also requires either valid backend user credentials and access to filemounts, or that frontend plugins using "t3lib_div::verifyFilenameAgainstDenyPattern()" or "processFiles()" to handle file uploads are installed. 2) Input passed in unspecified parameters to fe_adminlib.inc is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Successful exploitation of this vulnerability requires that a frontend extension based on fe_adminlib.inc is installed - e.g. direct_mail_subscription, feuser_admin, or kb_md5fepw. The vulnerabilities are reported in all 3.x versions, 4.0.x versions below 4.0.9, 4.1.x versions below 4.1.7, and in 4.2.0. SOLUTION: Update to version 4.0.9, 4.1.7, or 4.2.1. PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Michiel Roos and Marcus Krause. 2) The vendor credits Christian Seifert, Jeroen van Iddekinge, and Arnd Messer. ORIGINAL ADVISORY: TYPO3-20080611-1: http://typo3.org/teams/security/security-bulletins/typo3-20080611-1/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------