Skip to main navigation Skip to main content Skip to page footer

Several vulnerabilities in extension Formhandler (formhandler)

It has been discovered that the extension "Formhandler" (Formhandler) is vulnerable to SQL-Injection, Arbitrary Code Execution and Authentication Bypass.

Release Date: August 05, 2013

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Version: 1.6.0 and alll versions below

Vulnerability Type: SQL-Injection, Arbitrary Code Execution and Authentication Bypass

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:C/A:N/E:P/RL:O/RC:C (What's that?)

Problem Description: Failing to properly sanitize user-supplied input the extension is vulnerable to SQL-Injection, Arbitrary Code Execution and Authentication Bypass.

Solution: An updated version 1.6.1 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/formhandler/1.6.1/. Users of the extension are advised to update the extension as soon as possible.

Credits:  Credits go to TYPO3 Security Team Members Georg Ringer and Franz G. Jahn who discovered and reported the issue.

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.