Your message dated Wed, 04 Jun 2014 07:48:22 +0000
with message-id <e1ws5vq-0002jw...@franck.debian.org>
and subject line Bug#749215: fixed in typo3-src 4.5.19+dfsg1-5+wheezy3
has caused the Debian Bug report #749215,
regarding TYPO3-CORE-SA-2014-001: Multiple Vulnerabilities in TYPO3 CMS
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
749215: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749215
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: typo3-src
Severity: critical
Tags: security


It has been discovered that TYPO3 CMS is vulnerable to Cross-Site
Scripting, Insecure Unserialize, Improper Session Invalidation,
Authentication Bypass, Information Disclosure and Host Spoofing.

Component Type: TYPO3 CMS
Overall Severity: Medium
Release Date: May 22, 2014




Vulnerability Type: Host Spoofing
Affected Versions: Versions 4.5.0 to 4.5.33, 4.7.0 to 4.7.18, 6.0.0 to
6.0.13, 6.1.0 to 6.1.8 and 6.2.0 to 6.2.2
Severity: Medium
CVE: not assigned yet

Problem Description: Failing to properly validate the HTTP host-header
TYPO3 CMS is susceptible to host spoofing. TYPO3 uses the HTTP
host-header to generate absolute URLs in several places like 404
handling, http(s) enforcement, password reset links and many more. Since
the host header itself is provided by the client it can be forged to any
value, even in a name based virtual hosts environment. A blog post
describes this problem in great detail.



Vulnerable subcomponent: Color Picker Wizard

Vulnerability Type: Insecure Unserialize
Affected Versions: Versions 4.5.0 to 4.5.33, 4.7.0 to 4.7.18, 6.0.0 to
6.0.13 and 6.1.0 to 6.1.8
Severity: Low
CVE: not assigned yet

Problem Description: Failing to validate authenticity of a passed
serialized string, the color picker wizard is susceptible to insecure
unserialize, allowing authenticated editors to unserialize arbitrary PHP
objects.



Vulnerable subcomponent: Backend

Vulnerability Type: Cross-Site Scripting
Affected Versions: Versions 4.5.0 to 4.5.33, 4.7.0 to 4.7.18, 6.0.0 to
6.0.13, 6.1.0 to 6.1.8 and 6.2.0 to 6.2.2
Severity: Low
CVE: not assigned yet

Problem Description: Failing to properly encode user input, several
backend components are susceptible to Cross-Site Scripting, allowing
authenticated editors to inject arbitrary HTML or JavaScript by crafting
URL parameters.



Vulnerable subcomponent: ExtJS

Vulnerability Type: Cross-Site Scripting
Affected Versions: Versions 4.5.0 to 4.5.33, 4.7.0 to 4.7.18, 6.0.0 to
6.0.13, 6.1.0 to 6.1.8 and 6.2.0 to 6.2.2
Severity: Medium
CVE: not assigned yet

Problem Description: The ExtJS JavaScript framework that is shipped with
TYPO3 also delivers a flash file to show charts. This file is
susceptible to Cross-Site Scripting. This vulnerability can be exploited
without any authentication.



Vulnerable subcomponent: Authentication

Vulnerability Type: Authentication Bypass
Affected Versions: All TYPO3 versions not configured to use salted passwords
Severity: medium
CVE: not assigned yet

Problem Description: When the use of salted password is disabled (which
is enabled by default since TYPO3 4.6 and required since TYPO3 6.2)
passwords for backend access are stored as md5 hash in the database.
This hash (e.g. taken from a successful SQL injection) can be used
directly to authenticate backend users without knowing or reverse
engineering the password.


-- 
 MfG, Christian Welzel

  GPG-Key:     pub 4096R/5117E119 2011-09-19
  Fingerprint: 3688 337C 0D3E 3725 94EC  E401 8D52 CDE9 5117 E119

--- End Message ---
--- Begin Message ---
Source: typo3-src
Source-Version: 4.5.19+dfsg1-5+wheezy3

We believe that the bug you reported is fixed in the latest version of
typo3-src, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 749...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Welzel <gaw...@camlann.de> (supplier of updated typo3-src package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 25 May 2014 11:00:00 +0200
Source: typo3-src
Binary: typo3-src-4.5 typo3-database typo3-dummy typo3
Architecture: source all
Version: 4.5.19+dfsg1-5+wheezy3
Distribution: wheezy-security
Urgency: medium
Maintainer: Christian Welzel <gaw...@camlann.de>
Changed-By: Christian Welzel <gaw...@camlann.de>
Description: 
 typo3      - web content management system (meta)
 typo3-database - web content management system (database)
 typo3-dummy - web content management system (basic site structure)
 typo3-src-4.5 - web content management system (core)
Closes: 749215
Changes: 
 typo3-src (4.5.19+dfsg1-5+wheezy3) wheezy-security; urgency=medium
 .
   * Added patch for TYPO3-SA-2014-001. (Closes: #749215)
   * Set patch level version to -pl.4.5.34.
Checksums-Sha1: 
 8f47e527b656f50b1010ab1287bbbfa455e49033 2077 
typo3-src_4.5.19+dfsg1-5+wheezy3.dsc
 baca513e8e4b4336bfe12880215e6652efb5a8a0 440207 
typo3-src_4.5.19+dfsg1-5+wheezy3.debian.tar.gz
 97aa8dab0ee01118ff36088d27c472b8408f8fd0 20088954 
typo3-src-4.5_4.5.19+dfsg1-5+wheezy3_all.deb
 06b97b4c4cb2ae4fa9e37fb9add1cc52da52885d 282414 
typo3-database_4.5.19+dfsg1-5+wheezy3_all.deb
 183c419d1c77e541f272acfeb4dad6fc97759dbe 290622 
typo3-dummy_4.5.19+dfsg1-5+wheezy3_all.deb
 a27402bd12a1a9606c0c53be0371e479ef0db6cd 1394 
typo3_4.5.19+dfsg1-5+wheezy3_all.deb
Checksums-Sha256: 
 55a78968de4223bb766e07dc655eeff56049acd7804c2d74a5744af2f5098d0b 2077 
typo3-src_4.5.19+dfsg1-5+wheezy3.dsc
 459a26b708c037c3a5f461092388c67be1f985f667c1352dad53980a978d0992 440207 
typo3-src_4.5.19+dfsg1-5+wheezy3.debian.tar.gz
 16b9ed842cdf54151e1c1cefed00e98625c0c2b21b74f47c27c3f72c4ef60719 20088954 
typo3-src-4.5_4.5.19+dfsg1-5+wheezy3_all.deb
 6c55b7555d6c13ade8bb79f883ea7ade0c037ee754a7a211c74a04b222901a4c 282414 
typo3-database_4.5.19+dfsg1-5+wheezy3_all.deb
 3bf78a67da7475cf8f246dcad5a4eb4dff693fface6abd18c4c567063e6c527c 290622 
typo3-dummy_4.5.19+dfsg1-5+wheezy3_all.deb
 d2530dd4f6e89ef97d0816a164e73a98b334ae88246cf08dbafe6f733be41b39 1394 
typo3_4.5.19+dfsg1-5+wheezy3_all.deb
Files: 
 c707573596a7b10e7f2a0e41605fb7aa 2077 web optional 
typo3-src_4.5.19+dfsg1-5+wheezy3.dsc
 ed6edca9677276d4e93c16e404c92286 440207 web optional 
typo3-src_4.5.19+dfsg1-5+wheezy3.debian.tar.gz
 b2387dd8fd875481ce622b80ada4b1e0 20088954 web optional 
typo3-src-4.5_4.5.19+dfsg1-5+wheezy3_all.deb
 dce4668b8654306085b9d82e4f5d8b51 282414 web optional 
typo3-database_4.5.19+dfsg1-5+wheezy3_all.deb
 c6109537d3be2da72c0e2862a642019b 290622 web optional 
typo3-dummy_4.5.19+dfsg1-5+wheezy3_all.deb
 72b26c2ce9bd6a0e37c16ab045a47959 1394 web optional 
typo3_4.5.19+dfsg1-5+wheezy3_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ykFa
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to