Date: Fri, 26 Sep 2014 18:28:25 +0300 From: Henri Salo <henri@...v.fi> To: oss-security@...ts.openwall.com Subject: CVE request: TYPO3-EXT-SA-2014-012 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Can I get two 2014 CVEs for following vulnerabilities, thanks. http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-012/ It has been discovered that the extension "JobControl" (dmmjobcontrol) is susceptible to Cross-Site Scripting and SQL Injection. Release Date: September 25, 2014 Component Type: Third party extension. This extension is not a part of the TYPO3 default installation. Affected Versions: version 2.14.0 and below Vulnerability Type: Cross-Site Scripting, SQL Injection Severity: High Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:A/I:P/A:N/E:H/RL:U/RC:C Problem Description: The extension fails to properly escape user input in SQL and HTML context. Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author is longer maintaining this extension. Please uninstall and delete the extension folder from your installation. Credits: Credits go to Hans-Martin Münch who discovered and reported the issues. - --- Henri Salo -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlQlhhkACgkQXf6hBi6kbk8KGgCeNHD9OCRRuD4NSceJcs/7F5bB TugAn3E3Tw1NaD82hrIzDHEgApJ7e4pl =uzcS -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.