CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
55.7%
Directory traversal vulnerability in the TypoScript setup in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 allows remote authenticated administrators to read arbitrary files via unspecified vectors related to the “file inclusion functionality.”
Vendor | Product | Version | CPE |
---|---|---|---|
typo3 | typo3 | 4.2.0 | cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:* |
typo3 | typo3 | 4.2.1 | cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:* |
typo3 | typo3 | 4.2.2 | cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:* |
typo3 | typo3 | 4.2.3 | cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:* |
typo3 | typo3 | 4.2.4 | cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:* |
typo3 | typo3 | 4.2.5 | cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:* |
typo3 | typo3 | 4.2.6 | cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:* |
typo3 | typo3 | 4.2.7 | cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:* |
typo3 | typo3 | 4.2.8 | cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:* |
typo3 | typo3 | 4.2.9 | cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:* |
secunia.com/advisories/35770
typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/
www.openwall.com/lists/oss-security/2011/01/13/2
www.openwall.com/lists/oss-security/2012/05/10/7
www.openwall.com/lists/oss-security/2012/05/11/3
www.openwall.com/lists/oss-security/2012/05/12/5
www.osvdb.org/70119
www.securityfocus.com/bid/45470
exchange.xforce.ibmcloud.com/vulnerabilities/64180