6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
6.6 Medium
AI Score
Confidence
Low
0.002 Low
EPSS
Percentile
64.9%
TYPO3 is prone to multiple vulnerabilities.
# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
CPE = "cpe:/a:typo3:typo3";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.804205");
script_version("2023-04-05T10:19:45+0000");
script_cve_id("CVE-2013-4320", "CVE-2013-4321");
script_tag(name:"cvss_base", value:"6.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:P/A:P");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_tag(name:"last_modification", value:"2023-04-05 10:19:45 +0000 (Wed, 05 Apr 2023)");
script_tag(name:"creation_date", value:"2014-01-06 12:50:36 +0530 (Mon, 06 Jan 2014)");
script_name("TYPO3 File Abstraction Layer Multiple Vulnerabilities");
script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to execute arbitrary code
or read sensitive information.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"An error exists in the File Abstraction Layer, which implements partial
permissions for copying, deleting, and moving files and it does not properly
handle denied file extension names that contain special characters.");
script_tag(name:"solution", value:"Upgrade to TYPO3 version 6.0.9, 6.1.4 or later.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"summary", value:"TYPO3 is prone to multiple vulnerabilities.");
script_tag(name:"affected", value:"TYPO3 version 6.0.0 to 6.0.8, 6.1.0 to 6.1.3");
script_xref(name:"URL", value:"http://secunia.com/advisories/54679/");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/62255");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/62257");
script_xref(name:"URL", value:"https://typo3.org/security/advisory/typo3-core-sa-2013-003");
script_category(ACT_GATHER_INFO);
script_family("Web application abuses");
script_copyright("Copyright (C) 2014 Greenbone AG");
script_dependencies("gb_typo3_http_detect.nasl");
script_mandatory_keys("typo3/detected");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
if(!port = get_app_port(cpe:CPE))
exit(0);
if(!infos = get_app_version_and_location(cpe:CPE, port:port, exit_no_version:TRUE, version_regex:"[0-9]+\.[0-9]+\.[0-9]+")) # nb: Version might not be exact enough
exit(0);
vers = infos["version"];
path = infos["location"];
if(version_in_range(version:vers, test_version:"6.0.0", test_version2:"6.0.8") ||
version_in_range(version:vers, test_version:"6.1.0", test_version2:"6.1.3")) {
report = report_fixed_ver(installed_version:vers, fixed_version:"See advisory", install_path:path);
security_message(port:port, data:report);
exit(0);
}
exit(99);