Skip to main navigation Skip to main content Skip to page footer

Blind SQL Injection vulnerability in extension Calendar Base (cal)

It has been discovered that the extension Calendar Base (cal) is vulnerable to Blind SQL Injection.

Release Date: March 2, 2010

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: Version 1.3.1 and all versions below

Vulnerability Type: Blind SQL Injection

Severity: Medium

Problem Description: Failing to filter input from a third party data source (iCalendar) the extension is open to a Blind SQL Injection. The vulnerability allows remote website users to execute arbitrary commands on the TYPO3 database.

Solution: An updated version 1.3.2 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/cal/1.3.2/. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Christian Ferbar who discovered and reported the issue.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.