Lucene search

K
cve[email protected]CVE-2014-9509
HistoryOct 03, 2022 - 4:20 p.m.

CVE-2014-9509

2022-10-0316:20:41
CWE-20
web.nvd.nist.gov
23
typo3
frontend rendering
cache poisoning
remote attackers
cve-2014-9509

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.9 Medium

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

76.4%

The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set to all or cached, allows remote attackers to have an unspecified impact (possibly resource consumption) via a “Cache Poisoning” attack using a URL with arbitrary arguments, which triggers a reload of the page.

Affected configurations

NVD
Node
typo3typo3Match4.5.0
OR
typo3typo3Match4.5.1
OR
typo3typo3Match4.5.2
OR
typo3typo3Match4.5.3
OR
typo3typo3Match4.5.4
OR
typo3typo3Match4.5.5
OR
typo3typo3Match4.5.6
OR
typo3typo3Match4.5.7
OR
typo3typo3Match4.5.8
OR
typo3typo3Match4.5.9
OR
typo3typo3Match4.5.10
OR
typo3typo3Match4.5.11
OR
typo3typo3Match4.5.12
OR
typo3typo3Match4.5.13
OR
typo3typo3Match4.5.14
OR
typo3typo3Match4.5.15
OR
typo3typo3Match4.5.16
OR
typo3typo3Match4.5.17
OR
typo3typo3Match4.5.18
OR
typo3typo3Match4.5.19
OR
typo3typo3Match4.5.20
OR
typo3typo3Match4.5.21
OR
typo3typo3Match4.5.22
OR
typo3typo3Match4.5.23
OR
typo3typo3Match4.5.24
OR
typo3typo3Match4.5.25
OR
typo3typo3Match4.5.26
OR
typo3typo3Match4.5.27
OR
typo3typo3Match4.5.28
OR
typo3typo3Match4.5.29
OR
typo3typo3Match4.5.30
OR
typo3typo3Match4.5.31
OR
typo3typo3Match4.5.32
OR
typo3typo3Match4.5.33
OR
typo3typo3Match4.5.34
OR
typo3typo3Match4.5.35
OR
typo3typo3Match4.5.36
OR
typo3typo3Match4.5.37
OR
typo3typo3Match4.5.38
OR
typo3typo3Match4.6.0
OR
typo3typo3Match4.6.1
OR
typo3typo3Match4.6.2
OR
typo3typo3Match4.6.3
OR
typo3typo3Match4.6.4
OR
typo3typo3Match4.6.5
OR
typo3typo3Match4.6.6
OR
typo3typo3Match4.6.7
OR
typo3typo3Match4.6.8
OR
typo3typo3Match4.6.9
OR
typo3typo3Match4.6.10
OR
typo3typo3Match4.6.11
OR
typo3typo3Match4.6.12
OR
typo3typo3Match4.6.13
OR
typo3typo3Match4.6.14
OR
typo3typo3Match4.6.15
OR
typo3typo3Match4.6.16
OR
typo3typo3Match4.6.17
OR
typo3typo3Match4.6.18
OR
typo3typo3Match4.7.0
OR
typo3typo3Match4.7.1
OR
typo3typo3Match4.7.2
OR
typo3typo3Match4.7.3
OR
typo3typo3Match4.7.4
OR
typo3typo3Match4.7.5
OR
typo3typo3Match4.7.6
OR
typo3typo3Match4.7.7
OR
typo3typo3Match4.7.8
OR
typo3typo3Match4.7.9
OR
typo3typo3Match4.7.10
OR
typo3typo3Match4.7.11
OR
typo3typo3Match4.7.12
OR
typo3typo3Match4.7.13
OR
typo3typo3Match4.7.14
OR
typo3typo3Match4.7.15
OR
typo3typo3Match4.7.16
OR
typo3typo3Match4.7.17
OR
typo3typo3Match4.7.18
OR
typo3typo3Match4.7.19
OR
typo3typo3Match4.7.20
OR
typo3typo3Match6.0
OR
typo3typo3Match6.0.1
OR
typo3typo3Match6.0.2
OR
typo3typo3Match6.0.3
OR
typo3typo3Match6.0.4
OR
typo3typo3Match6.0.5
OR
typo3typo3Match6.0.6
OR
typo3typo3Match6.0.7
OR
typo3typo3Match6.0.8
OR
typo3typo3Match6.0.9
OR
typo3typo3Match6.0.10
OR
typo3typo3Match6.0.11
OR
typo3typo3Match6.0.12
OR
typo3typo3Match6.0.13
OR
typo3typo3Match6.0.14
OR
typo3typo3Match6.1
OR
typo3typo3Match6.1.1
OR
typo3typo3Match6.1.2
OR
typo3typo3Match6.1.3
OR
typo3typo3Match6.1.4
OR
typo3typo3Match6.1.5
OR
typo3typo3Match6.1.6
OR
typo3typo3Match6.1.7
OR
typo3typo3Match6.1.8
OR
typo3typo3Match6.1.9
OR
typo3typo3Match6.2
OR
typo3typo3Match6.2.0beta1
OR
typo3typo3Match6.2.0beta2
OR
typo3typo3Match6.2.0beta3
OR
typo3typo3Match6.2.1
OR
typo3typo3Match6.2.2
OR
typo3typo3Match6.2.3
OR
typo3typo3Match6.2.4
OR
typo3typo3Match6.2.5
OR
typo3typo3Match6.2.6
OR
typo3typo3Match6.2.7
OR
typo3typo3Match6.2.8
OR
typo3typo3Match7.0.0
OR
typo3typo3Match7.0.1

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.9 Medium

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

76.4%