Lucene search

K
freebsdFreeBSD653606E9-F6AC-11DD-94D9-0030843D3802
HistoryFeb 07, 2009 - 12:00 a.m.

typo3 -- multiple vulnerabilities

2009-02-0700:00:00
vuxml.freebsd.org
11

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.024 Low

EPSS

Percentile

90.0%

Secunia reports:

Some vulnerabilities have been reported in Typo3, which can be
exploited by malicious people to bypass certain security restrictions,
conduct cross-site scripting and session fixation attacks, and
compromise a vulnerable system.
The “Install tool” system extension uses insufficiently random
entropy sources to generate an encryption key, resulting in weak
security.
The authentication library does not properly invalidate supplied
session tokens, which can be exploited to hijack a user’s
session.
Certain unspecified input passed to the “Indexed Search Engine”
system extension is not properly sanitised before being used to invoke
commands. This can be exploited to inject and execute arbitrary shell
commands.
Input passed via the name and content of files to the “Indexed Search
Engine” system extension is not properly sanitised before being returned
to the user. This can be exploited to execute arbitrary HTML and script
code in a user’s browser session in context of an affected site.
Certain unspecified input passed to the Workspace module is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user’s
browser session in context of an affected site.
Note: It is also reported that certain unspecified input passed to
test scripts of the “ADOdb” system extension is not properly sanitised
before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user’s browser session in context
of an affected website.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchtypo3< 4.2.4UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.024 Low

EPSS

Percentile

90.0%