Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140926152825.GA5414@kludge.henri.nerv.fi>
Date: Fri, 26 Sep 2014 18:28:25 +0300
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Subject: CVE request: TYPO3-EXT-SA-2014-012

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Can I get two 2014 CVEs for following vulnerabilities, thanks.

http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-012/

It has been discovered that the extension "JobControl" (dmmjobcontrol) is
susceptible to Cross-Site Scripting and SQL Injection.

Release Date: September 25, 2014
Component Type: Third party extension. This extension is not a part of the TYPO3
default installation.

Affected Versions: version 2.14.0 and below
Vulnerability Type: Cross-Site Scripting, SQL Injection
Severity: High
Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:A/I:P/A:N/E:H/RL:U/RC:C

Problem Description: The extension fails to properly escape user input in SQL
and HTML context.

Solution: Versions of this extension that are known to be vulnerable will no
longer be available for download from the TYPO3 Extension Repository. The
extension author is longer maintaining this extension. Please uninstall and
delete the extension folder from your installation.

Credits: Credits go to Hans-Martin Münch who discovered and reported the issues.

- ---
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlQlhhkACgkQXf6hBi6kbk8KGgCeNHD9OCRRuD4NSceJcs/7F5bB
TugAn3E3Tw1NaD82hrIzDHEgApJ7e4pl
=uzcS
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.