[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re:=?ISO-8859-15?Q?=20?=[Ticket#2012111110000015] TYPO3-CORE-SA-2012-005: Several Vul
From:       TYPO3 Security Team <security () typo3 ! org>
Date:       2013-06-16 11:46:05
Message-ID: 1371383165.202789.564052523.2922.14 () securityteam ! typo3 ! org
[Download RAW message or body]

Dear Kurt Seifried,

Thank you for your request.

I'm a bit embarrassed about our response time :(

Very sorry for that. Things will vastly improve in the near future!

12/10/2012 22:40 - Kurt Seifried wrote:

> Can the Typo3 security team please confirm the following:
> 
> > Component Type: TYPO3 Core Affected Versions: 4.5.0 up to 4.5.20,
> > 4.6.0 up to 4.6.13, 4.7.0 up
> to 4.7.5 and development releases of the 6.0 branch.
> > Vulnerability Types: SQL Injection, Cross-Site Scripting,
> Information Disclosure
> 
> so no CVE's needed for this, this is simply a summary of the below issues?

True!

> > Vulnerable subcomponent: TYPO3 Backend History Module Vulnerability
> > Type: SQL Injection, Cross-Site Scripting Solution: Update to the
> > TYPO3 version 4.5.21, 4.6.14 or 4.7.6 that
> fix the problem described!
> > Credits: Credits go to Thomas Worm who discovered and reported the
> issue.
> 
> Did he discover both the SQL Injection and the Cross-Site Scripting
> issues? 

No, he only discovered the XSS. We discovered the SQLi while fixing the XSS.

> Can you provide a link to the specific code fixes?

Here it is.
https://review.typo3.org/16304

> so 2 cve's needed correct?

Yes.

> > Vulnerable subcomponent: TYPO3 Backend History Module Vulnerability
> > Type: Information Disclosure
> Solution: Update to the TYPO3 version 4.5.21, 4.6.14 or 4.7.6 that fix
> the problem described!
> > Credits: Credits go to Core Team Member Oliver Hader who
> > discovered
> and fixed the issue.
> 
> so one cve needed here? Can you provide a link to the specific code fixes?

Yes.

It's also fixed in the same change:
https://review.typo3.org/16304

> > Vulnerable subcomponent: TYPO3 Backend API Vulnerability Type:
> > Cross-Site Scripting Solution: Update to the TYPO3 version 4.5.21,
> > 4.6.14 or 4.7.6 that
> fix the problem described!
> > Credits: Credits go to Johannes Feustel who discovered and
> > reported
> the issue.
> 
> so one cve needed here? Can you provide a link to the specific code fixes?

Yes: https://review.typo3.org/16305

> > Vulnerability Type: Cross-Site Scripting Solution: Update to the
> > TYPO3 version 4.5.21, 4.6.14 or 4.7.6 that
> fix the problem described!
> > Credits: Credits go to Richard Brain who discovered and reported
> > the
> issue.
> 
> so one cve needed here? Can you provide a link to the specific code fixes?

Yes: https://review.typo3.org/16300


Regards,

Helmut Hummel
Member of the TYPO3 Security Team

--
TYPO3 Security Team homepage: http://typo3.org/teams/security/

E-Mail: security@typo3.org

Please note: When replying to this e-mail, please leave the header intact.
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic