TYPO3 Extensions Multiple SQL Injection and Cross Site Scripting Issues


Description   Multiple vulnerabilities have been identified in various TYPO3 extensions, which could be exploited by attackers to bypass security restrictions, disclose sensitive information or manipulate certain data. These issues are caused by access and input validation errors when processing user-supplied data, which could be exploited by malicious people to conduct SQL injection and cross site scripting attacks, or disclose certain information.
     
Vulnerable Products   Vulnerable Software:
TYPO3 Watchdog (aba_watchdog) version 2.0.2 and priorCar (car) version 0.1.1File list (dr_blob) version 2.1.1ListMan (nl_listman) version 1.2.1XDS Staff List (xds_staff) version 0.0.3 and priorDocument Directorys (danp_documentdirs) version 1.10.7 and priorRandom Prayer Version 2 (ste_prayer2) version 0.0.3 and priorDiocese of Portsmouth Resources Database (pd_resources) version 0.1.1 and priorParish of the Holy Spirit Religious Art Gallery (hs_religiousartgallery) version 0.1.2 and priorParish Administration Database (ste_parish_admin) version 0.1.3 and priorDiocese of Portsmouth Calendar (pd_calendar) version 0.4.1 and priorFlash SlideShow (slideshow) version 0.2.2Subscription (mf_subscription) version 0.2.2No indexed Search (no_indexed_search) version 0.2.0Job Exchange (jobexchange) version 0.0.3Training Company Database (trainincdb) version 0.4.7ZID Linkliste (zid_linklist) version 1.0.0vShoutbox (vshoutbox) version 0.0.1Frontend news submitter with RTE (fe_rtenews) version 1.4.1 and prior
     
Solution   Upgrade to fixed versions or disable the affected extensions : http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/
     
CVE   CVE-2009-4401
CVE-2009-4400
CVE-2009-4399
CVE-2009-4398
CVE-2009-4397
CVE-2009-4396
CVE-2009-4395
CVE-2009-4394
CVE-2009-4393
CVE-2009-4392
CVE-2009-4391
CVE-2009-4390
CVE-2009-4389
CVE-2009-4388
CVE-2009-4346
CVE-2009-4345
CVE-2009-4344
CVE-2009-4343
CVE-2009-4342
CVE-2009-4341
CVE-2009-4340
CVE-2009-4339
CVE-2009-4338
CVE-2009-4337
CVE-2009-4336
     
References   http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious tag with event found in data
3.2.0
SQL injection Prevention - GET : suspicious OR statement in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
SQL injection Prevention - POST : suspicious SELECT statement in data
3.2.0
XSS - Prevention - POST : suspicious 'object' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious combination of 'OR' or 'AND' statements in URL
3.2.0
SQL injection Prevention - POST : possible version probing in data
3.2.0
SQL injection Prevention - GET : suspicious CREATE statement in URL
3.2.0
SQL injection Prevention - GET : suspicious CAST statement in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENROWSET statement in URL
3.2.0
SQL injection Prevention - GET : suspicious DECLARE statement in URL
3.2.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
3.2.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
3.2.0
SQL injection Prevention - POST : suspicious CREATE statement in data
3.2.0
XSS - Prevention - POST : 'location' javascript object found in data
3.2.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - POST : javascript code found in data
3.2.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
3.2.0
SQL injection Prevention - POST : suspicious UNION statement in data
3.2.0
SQL injection Prevention - GET : suspicious OPENQUERY statement in URL
3.2.0
XSS - Prevention - POST : code allowing cookie access found in data
3.2.0
SQL injection Prevention - GET : suspicious shutdown statement in URL
3.2.0
SQL injection Prevention - GET : suspicious UNION SELECT statement in URL
3.2.0
SQL injection Prevention - POST : suspicious DROP statement in data
3.2.0
SQL injection Prevention - GET : possible database version probing
3.2.0
SQL injection Prevention - POST : suspicious INSERT statement in data
3.2.0
SQL injection Prevention - POST : suspicious OR statement in data
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
SQL injection Prevention - GET : suspicious UPDATE SET statement in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
SQL injection Prevention - POST : suspicious EXEC statement in data
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious SELECT statement in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious INSERT statement in URL
3.2.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
3.2.0
Misc : Remote code execution prevention: 2 '|' characters found as a parameter of a script file
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
SQL injection Prevention - GET : suspicious DROP statement in URL
3.2.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
3.2.0
SQL injection Prevention - GET : suspicious EXEC statement in URL
3.2.0
XSS - Prevention - POST : suspicious 'div' tag found in data
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
SQL injection Prevention - GET : block comment delimiters in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - POST : 'script' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
SQL injection Prevention - POST : suspicious HAVING statement in data
3.2.0
SQL injection Prevention - POST : suspicious CAST statement in data
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2009-12-16 

 Target Type 
Client + Server 

 Possible exploit 
Local & Remote