Lucene search

K
githubGitHub Advisory DatabaseGHSA-W736-QV86-VQ94
HistoryMay 17, 2022 - 5:28 a.m.

TYPO3 Remote File Disclosure vulnerability in the jumpUrl mechanism

2022-05-1705:28:57
CWE-284
GitHub Advisory Database
github.com
12

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:C/I:N/A:N

6.8 Medium

AI Score

Confidence

Low

0.085 Low

EPSS

Percentile

94.5%

The jumpUrl (aka access tracking) implementation in tslib/class.tslib_fe.php in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly compare certain hash values during access-control decisions, which allows remote attackers to read arbitrary files via unspecified vectors.

Affected configurations

Vulners
Node
typo3typo3Range<4.4.4
OR
typo3typo3Range<4.3.7
OR
typo3typo3Range<4.2.15

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:C/I:N/A:N

6.8 Medium

AI Score

Confidence

Low

0.085 Low

EPSS

Percentile

94.5%