Your message dated Wed, 20 Oct 2010 14:32:24 +0000
with message-id <[email protected]>
and subject line Bug#599334: fixed in typo3-src 4.2.5-1+lenny6
has caused the Debian Bug report #599334,
regarding TYPO3 Security Bulletin TYPO3-SA-2010-020: Multiple vulnerabilities 
in TYPO3 Core
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
599334: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599334
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: typo3-src
Severity: critical
Tags: security


Affected Versions: 4.2.14 and below, 4.3.6 and below, 4.4.3 and below
Vulnerability Types: Remote File Disclosure, Cross-Site Scripting (XSS),
Privilege Escalation, Denial of Service



Vulnerable subcomponent #1: Access tracking mechanism

Vulnerability Type: Remote File Disclosure
Severity: Critical
Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:F/RL:OF/RC:C
Problem Description: A Remote File Disclosure vulnerability in the
jumpUrl mechanism, used to track access on web pages and provided files,
allows a remote attacker to read arbitrary files on a host. Because of a
non-typesafe comparison between the submitted and the calculated hash,
it is possible to spoof a hash value to bypass the access control.
There's no authentication required to exploit this vulnerability. The
vulnerability allows to read any file, the web server user account has
access to.



Vulnerable subcomponent #2: Backend

Vulnerability Type: Cross-Site Scripting
Severity: Medium
Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C
Problem Description: Failing to sanitize user input, the TYPO3 backend
is susceptible to XSS attacks in several places. A valid backend login
is required to exploit these vulnerabilities.


Vulnerability Type: Remote File Disclosure
Severity: Low
Suggested CVSS v2.0: AV:N/AC:M/Au:S/C:C/I:P/A:N/E:F/RL:OF/RC:C
Problem Description: Failing to properly validate user input, the
Extension Manager is susceptible to Remote File Disclosure. By forging a
special request parameter it is possible to view (and edit under special
conditions) the contents of every file the webserver has access to. A
valid admin user login is required to exploit this vulnerability.


Vulnerability Type: Privilege Escalation
Severity: Medium
Suggested CVSS v2.0: AV:N/AC:H/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C
Problem Description: Failing to properly validate user input, the
sys_action task "be_user_creation" is susceptible to Privilege
Escalation. By forging a POST request an editor with the rights to
create users in the taskcenter, can create users which are a member of
arbitrary usergroups and by that probably leverage her privileges.



Vulnerable subcomponent #3: Validation/ Filtering API

Vulnerability Type: Denial of Service
Severity: Medium
Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
Problem Description: Because of a PHP crash in the filter_var() function
when passing large strings to it, TYPO3 is susceptible to a Denial of
Service attack in every place the API function t3lib_div::validEmail()
is used.


Vulnerability Type: Cross-Site Scripting
Severity: Low
Suggested CVSS v2.0: AV:N/AC:H/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C
Problem Description: The normalisation feature of the RemoveXSS function
was incomplete, allowing an attacker to inject arbitrary JavaScript code.


-- 
 MfG, Christian Welzel

  GPG-Key:     http://www.camlann.de/de/pgpkey.html
  Fingerprint: 4F50 19BF 3346 36A6 CFA9 DBDC C268 6D24 70A1 AD15



--- End Message ---
--- Begin Message ---
Source: typo3-src
Source-Version: 4.2.5-1+lenny6

We believe that the bug you reported is fixed in the latest version of
typo3-src, which is due to be installed in the Debian FTP archive:

typo3-src-4.2_4.2.5-1+lenny6_all.deb
  to main/t/typo3-src/typo3-src-4.2_4.2.5-1+lenny6_all.deb
typo3-src_4.2.5-1+lenny6.diff.gz
  to main/t/typo3-src/typo3-src_4.2.5-1+lenny6.diff.gz
typo3-src_4.2.5-1+lenny6.dsc
  to main/t/typo3-src/typo3-src_4.2.5-1+lenny6.dsc
typo3_4.2.5-1+lenny6_all.deb
  to main/t/typo3-src/typo3_4.2.5-1+lenny6_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Welzel <[email protected]> (supplier of updated typo3-src package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 08 Oct 2010 22:00:00 +0200
Source: typo3-src
Binary: typo3 typo3-src-4.2
Architecture: source all
Version: 4.2.5-1+lenny6
Distribution: stable-security
Urgency: high
Maintainer: Christian Welzel <[email protected]>
Changed-By: Christian Welzel <[email protected]>
Description: 
 typo3      - Powerful content management framework (Meta package)
 typo3-src-4.2 - Powerful content management framework (Core)
Closes: 599334
Changes: 
 typo3-src (4.2.5-1+lenny6) stable-security; urgency=high
 .
   * Security patch from new upstream release 4.2.15:
     - fixes: "TYPO3 Security Bulletin TYPO3-SA-2010-020: Multiple
       vulnerabilities in TYPO3 Core" (Closes: 599334)
Checksums-Sha1: 
 f5d2c432a6851f4c65fbec5d49f7ba5848960fbb 1008 typo3-src_4.2.5-1+lenny6.dsc
 6199ccc4c3f25d6c72cff52b39081de7804c79f4 152742 
typo3-src_4.2.5-1+lenny6.diff.gz
 2926d022bec7a5ca160043c3ace640d6b39c3ec5 134112 typo3_4.2.5-1+lenny6_all.deb
 87c7fb9a04dea38757002356727d513650bd7e9a 8195348 
typo3-src-4.2_4.2.5-1+lenny6_all.deb
Checksums-Sha256: 
 3a948bb62a3d41d613a7b4d93f0b36e9585d6681f5bf28604045e50739cc8153 1008 
typo3-src_4.2.5-1+lenny6.dsc
 ce09e1d01f4ef6af328015fcee67cff4d5e804744683125a6cc88994f90fb7c7 152742 
typo3-src_4.2.5-1+lenny6.diff.gz
 72fbed6eb0f93a98684d5cdeeb679182734861c3329c148ed2817434fe977629 134112 
typo3_4.2.5-1+lenny6_all.deb
 14cd02c1d26d680b789606ae6dd87e714cec2fbc4ce028b9ead76be69a1a08c1 8195348 
typo3-src-4.2_4.2.5-1+lenny6_all.deb
Files: 
 bf881e512e212abd941cdc5fa1b92e85 1008 web optional typo3-src_4.2.5-1+lenny6.dsc
 0d4c91f55399c8b0e3f1f576e485e61c 152742 web optional 
typo3-src_4.2.5-1+lenny6.diff.gz
 ba4ae758bf6725380f09286311c088da 134112 web optional 
typo3_4.2.5-1+lenny6_all.deb
 8ec1360dce403f5c1ecf5cb75e5be16b 8195348 web optional 
typo3-src-4.2_4.2.5-1+lenny6_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFMsbolUHLQNqxYNSARApI0AJ9WAFWC/S9EFRls7AHF6aZcFNbfiwCgtynY
ynd7BiPuZYiYulEtR1WWwoU=
=LTCs
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to