Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 5 Sep 2014 09:53:28 +0300
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Cc: TYPO3 Security Team <security@...o3.org>
Subject: CVE request: TYPO3-EXT-SA-2014-006

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Can I get 2014 CVE for TYPO3-EXT-SA-2014-006, thanks.

http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-006/
http://osvdb.org/105758

Release Date: April 10, 2014
Affected Versions: powermail: Version 2.0.0 - 2.0.10
Vulnerability Type: Captcha Bypass
Severity: Low
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:O/RC:C
Problem Description: The extension powermail offers the use of a captch
validation to secure forms. It was possible to bypass the captcha validation and
submit forms.
Important Note: Other field validators weren't involved so any other validation
worked as expected.
Solution: Updated version 2.0.11 is available from the TYPO3 extension manager
and at http://typo3.org/extensions/repository/download/powermail/2.0.11/t3x/.
Users of the extension are advised to update the extension as soon as possible
as long as they use captchas in their forms.
Credits: Credits go to Jigal van Hemert who discovered and reported this issue.

- ---
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlQJXegACgkQXf6hBi6kbk8S6QCcDgRePHwBPfgTAdzL+8xxFK+L
0BkAn3ZGwxRoHTlALdOdoETUK+dkugV6
=ZOfL
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.