Lucene search

K
openvasCopyright (C) 2014 Greenbone AGOPENVAS:1361412562310804206
HistoryJan 06, 2014 - 12:00 a.m.

TYPO3 Multiple Vulnerabilities (Dec 2013)

2014-01-0600:00:00
Copyright (C) 2014 Greenbone AG
plugins.openvas.org
11

6.3 Medium

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

68.1%

TYPO3 is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:typo3:typo3";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.804206");
  script_version("2024-02-20T05:05:48+0000");
  script_cve_id("CVE-2013-7073", "CVE-2013-7074", "CVE-2013-7075",
                "CVE-2013-7078", "CVE-2013-7079", "CVE-2013-7081");
  script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_tag(name:"qod_type", value:"remote_banner_unreliable");
  script_tag(name:"last_modification", value:"2024-02-20 05:05:48 +0000 (Tue, 20 Feb 2024)");
  script_tag(name:"creation_date", value:"2014-01-06 15:22:20 +0530 (Mon, 06 Jan 2014)");
  script_name("TYPO3 Multiple Vulnerabilities (Dec 2013)");

  script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to get sensitive
information or execute arbitrary script code.");
  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
  script_tag(name:"insight", value:"Multiple errors exist in the application:

  - Multiple errors exist in Content Editing Wizard, which fails to check user
permissions, properly encode user input and which misses signature for an
input parameter.

  - An error exists in Extbase Framework, which returns error messages without
properly encoding.

  - An error exists in openid extension, which allows redirection to arbitrary
URL.

  - An error exists in form content element, which allows generation of arbitrary
signatures that could be used in a different context.");
  script_tag(name:"solution", value:"Upgrade to TYPO3 version 4.5.32, 4.7.17, 6.0.12, 6.1.7 or later.");
  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"summary", value:"TYPO3 is prone to multiple vulnerabilities.");
  script_tag(name:"affected", value:"TYPO3 version 4.5.0 to 4.5.31, 4.7.0 to 4.7.16, 6.0.0 to 6.0.11, 6.1.0 to
6.1.6");

  script_xref(name:"URL", value:"http://secunia.com/advisories/55958/");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/64238");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/64239");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/64240");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/64245");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/64252");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/64256");
  script_xref(name:"URL", value:"https://typo3.org/security/advisory/typo3-core-sa-2013-004");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");
  script_copyright("Copyright (C) 2014 Greenbone AG");
  script_dependencies("gb_typo3_http_detect.nasl");
  script_mandatory_keys("typo3/detected");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if(!port = get_app_port(cpe:CPE))
  exit(0);

if(!infos = get_app_version_and_location(cpe:CPE, port:port, exit_no_version:TRUE, version_regex:"[0-9]+\.[0-9]+\.[0-9]+")) # nb: Version might not be exact enough
  exit(0);

vers = infos["version"];
path = infos["location"];

if(version_in_range(version:vers, test_version:"4.5.0", test_version2:"4.5.31") ||
   version_in_range(version:vers, test_version:"4.7.0", test_version2:"4.7.16") ||
   version_in_range(version:vers, test_version:"6.0.0", test_version2:"6.0.11") ||
   version_in_range(version:vers, test_version:"6.1.0", test_version2:"6.1.6")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"See advisory", install_path:path);
  security_message(port:port, data:report);
  exit(0);
}

exit(99);

6.3 Medium

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

68.1%