TYPO3 4.0.x before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.2.1, uses an insufficiently restrictive default fileDenyPattern for Apache, which allows remote attackers to bypass security restrictions and upload configuration files such as .htaccess, or conduct file upload attacks using multiple extensions.
buzz.typo3.org/teams/security/article/advice-on-core-security-issue-regarding-filedenypattern
typo3.org/teams/security/security-bulletins/typo3-20080611-1
www.debian.org/security/2008/dsa-1596
exchange.xforce.ibmcloud.com/vulnerabilities/42988
github.com/TYPO3-CMS/core
nvd.nist.gov/vuln/detail/CVE-2008-2717
web.archive.org/web/20080815050856/securityreason.com/securityalert/3945
web.archive.org/web/20081201212626/secunia.com/advisories/30619
web.archive.org/web/20081206030529/secunia.com/advisories/30660
web.archive.org/web/20200228131005/www.securityfocus.com/bid/29657
web.archive.org/web/20201208012148/www.securityfocus.com/archive/1/493270/100/0/threaded