Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 5 Sep 2014 10:45:07 +0300
From: Henri Salo <>
Cc: TYPO3 Security Team <>
Subject: CVE request: TYPO3-EXT-SA-2014-001

Hash: SHA1

Can I get three 2014 CVEs for TYPO3-EXT-SA-2014-001, thanks. One CVE might be
enough as per same reporters and fixed in version.

It has been discovered that the extension "mm_forum" (mm_forum) is vulnerable to
Arbitrary Code Execution, Cross-Site Scripting and Cross-Site Request Forgery.

Release Date: February 12, 2014
Affected Versions: Version 1.9.2 and below
Vulnerability Type: Arbitrary Code Execution, Cross-Site Scripting and
Cross-Site Request Forgery (CSRF).

Severity: Critical
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C

Problem Description: Failing to properly sanitize user-supplied input the
extension is vulnerable to Cross-Site Scripting. It was possible to upload
arbitrary files as files were not checked against the file deny pattern, thus
Arbitrary Code Execution was possible by uploading PHP files. Additionally it
was possible to create posts on behalf of logged in users (CSRF).

Solution: An updated version 1.9.3 is available from the TYPO3 extension manager
and at
Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Michael Knabe and Stano Paska who discovered and reported
the issue.

- ---
Henri Salo
Version: GnuPG v1.4.12 (GNU/Linux)


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.