Debian Security Advisory
DSA-1926-1 typo3-src -- several vulnerabilities
- Date Reported:
- 04 Nov 2009
- Affected Packages:
- typo3-src
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 552020.
In Mitre's CVE dictionary: CVE-2009-3628, CVE-2009-3629, CVE-2009-3630, CVE-2009-3631, CVE-2009-3632, CVE-2009-3633, CVE-2009-3634, CVE-2009-3635, CVE-2009-3636. - More information:
-
Several remote vulnerabilities have been discovered in the TYPO3 web content management framework. The Common Vulnerabilities and Exposures project identifies the following problems:
- CVE-2009-3628
The Backend subcomponent allows remote authenticated users to determine an encryption key via crafted input to a form field.
- CVE-2009-3629
Multiple cross-site scripting (XSS) vulnerabilities in the Backend subcomponent allow remote authenticated users to inject arbitrary web script or HTML.
- CVE-2009-3630
The Backend subcomponent allows remote authenticated users to place arbitrary web sites in TYPO3 backend framesets via crafted parameters.
- CVE-2009-3631
The Backend subcomponent, when the DAM extension or ftp upload is enabled, allows remote authenticated users to execute arbitrary commands via shell metacharacters in a filename.
- CVE-2009-3632
SQL injection vulnerability in the traditional frontend editing feature in the Frontend Editing subcomponent allows remote authenticated users to execute arbitrary SQL commands.
- CVE-2009-3633
Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script.
- CVE-2009-3634
Cross-site scripting (XSS) vulnerability in the Frontend Login Box (aka felogin) subcomponent allows remote attackers to inject arbitrary web script or HTML.
- CVE-2009-3635
The Install Tool subcomponent allows remote attackers to gain access by using only the password's md5 hash as a credential.
- CVE-2009-3636
Cross-site scripting (XSS) vulnerability in the Install Tool subcomponent allows remote attackers to inject arbitrary web script or HTML.
For the old stable distribution (etch), these problems have been fixed in version 4.0.2+debian-9.
For the stable distribution (lenny), these problems have been fixed in version 4.2.5-1+lenny2.
For the unstable distribution (sid), these problems have been fixed in version 4.2.10-1.
We recommend that you upgrade your typo3-src package.
- CVE-2009-3628
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src-4.0_4.0.2+debian-9_all.deb
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3_4.0.2+debian-9_all.deb
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3_4.0.2+debian-9_all.deb
- Source:
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.0.2+debian-9.diff.gz
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.0.2+debian.orig.tar.gz
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.0.2+debian-9.dsc
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.0.2+debian.orig.tar.gz
Debian GNU/Linux 5.0 (lenny)
- Source:
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.2.5.orig.tar.gz
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.2.5-1+lenny2.diff.gz
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.2.5-1+lenny2.dsc
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.2.5-1+lenny2.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src-4.2_4.2.5-1+lenny2_all.deb
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3_4.2.5-1+lenny2_all.deb
- http://security.debian.org/pool/updates/main/t/typo3-src/typo3_4.2.5-1+lenny2_all.deb
MD5 checksums of the listed files are available in the original advisory.