Dear TYPO3 users,
several vulnerabilities have been found in the following third party TYPO3
extensions:
"Kitodo.Presentation" (dlf)
"Bookdatabase" (extbookdatabase)
"Varnishcache" (varnishcache)
"Hardcoded text to Locallang" (mqk_locallangtools)
For further information on the issues, please read the related advisories
TYPO3-EXT-SA-2022-001, TYPO3-EXT-SA-2022-002, TYPO3-EXT-SA-2022-003 and
TYPO3-EXT-SA-2022-004 which were published today:
TYPO3-EXT-SA-2022-001: Server-side request forgery in extension
"Kitodo.Presentation" (dlf)
[1]TYPO3-EXT-SA-2022-001: Server-side request forgery in extension "Kitodo.Presentation" (dlf)
TYPO3-EXT-SA-2022-002: Cross-Site Scripting in extension "Bookdatabase"
(extbookdatabase)
[2]TYPO3-EXT-SA-2022-002: Cross-Site Scripting in extension "Bookdatabase" (extbookdatabase)
TYPO3-EXT-SA-2022-003: Insecure direct object reference in extension
"Varnishcache" (varnishcache)
[3]TYPO3-EXT-SA-2022-003: Insecure direct object reference in extension "Varnishcache" (varnishcache)
TYPO3-EXT-SA-2022-004: File Content Injection in extension "Hardcoded text to
Locallang" (mqk_locallangtools)
[4]TYPO3-EXT-SA-2022-004: File Content Injection in extension "Hardcoded text to Locallang" (mqk_locallangtools)
In general the TYPO3 Security Team recommends to read the following pages:
The TYPO3 Security Guide:
[5]Security guidelines — TYPO3 Explained main documentation
Make sure you are subscribed to the TYPO3 Announce List:
[6]TYPO3-announce Info Page
See all TYPO3 security advisories:
[7]TYPO3 Security Bulletins
Regards,
Torben Hansen
Member of the TYPO3 Security Team