Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTA-2010-AVI-474
Vulnerability from certfr_avis
De multiples vulnérabilités dans TYPO3 permettent un déni de service à distance, la lecture de certains fichiers du système, une élévation de privilèges et une injection de code indirecte à distance.
Description
De multiples vulnérabilités ont été découvertes dans TYPO3 :
- une faille permet le contournement du mécanisme jumpUrl, dont la fonctionnalité est de vérifier les droits d'accès à des pages ou des fichiers. L'exploitation de cette vulnérabilité permet de lire tout fichier auquel le compte ayant lancé le serveur Web a accès ;
- une injection de code indirecte est possible via le backend de TYPO3. Il est néanmoins nécessaire de disposer d'un compte autorisé à se connecter au backend pour pouvoir exploiter cette vulnérabilité ;
- une faille dans le gestionnaire d'extensions permet de lire les fichiers auxquels le serveur Web a accès. Il est nécessaire de disposer d'un compte d'administrateur pour pouvoir exploiter cette vulnérabilité ;
- la tâche be_user_creation permet de créer des utilisateurs qui sont membres de groupes arbitraires et par ce biais, d'élever les privilèges. L'exploitation de cette vulnérabilité requiert des droits de création d'utilisateurs dans le centre de tâches ;
- un problème dans la fonction PHP filter_var() permet la réalisation d'un déni de service à distance lorsque la fonction t3lib_div::validEMail() est utilisée ;
- une injection de code indirecte est possible via la fonction RemoveXSS.
Solution
Mettre à jour TYPO3 en version 4.2.15, 4.3.7 ou 4.4.4.
NoneImpacted products
References
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "TYPO3 versions 4.2.x ant\u00e9rieures \u00e0 4.2.15 ;", "product": { "name": "Typo3", "vendor": { "name": "Typo3", "scada": false } } }, { "description": "TYPO3 versions 4.3.x ant\u00e9rieures \u00e0 4.3.7 ;", "product": { "name": "Typo3", "vendor": { "name": "Typo3", "scada": false } } }, { "description": "TYPO3 versions 4.4.x ant\u00e9rieures \u00e0 4.4.4.", "product": { "name": "Typo3", "vendor": { "name": "Typo3", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans TYPO3 :\n\n- une faille permet le contournement du m\u00e9canisme jumpUrl, dont la\n fonctionnalit\u00e9 est de v\u00e9rifier les droits d\u0027acc\u00e8s \u00e0 des pages ou des\n fichiers. L\u0027exploitation de cette vuln\u00e9rabilit\u00e9 permet de lire tout\n fichier auquel le compte ayant lanc\u00e9 le serveur Web a acc\u00e8s ;\n- une injection de code indirecte est possible via le backend de\n TYPO3. Il est n\u00e9anmoins n\u00e9cessaire de disposer d\u0027un compte autoris\u00e9\n \u00e0 se connecter au backend pour pouvoir exploiter cette vuln\u00e9rabilit\u00e9\n ;\n- une faille dans le gestionnaire d\u0027extensions permet de lire les\n fichiers auxquels le serveur Web a acc\u00e8s. Il est n\u00e9cessaire de\n disposer d\u0027un compte d\u0027administrateur pour pouvoir exploiter cette\n vuln\u00e9rabilit\u00e9 ;\n- la t\u00e2che be_user_creation permet de cr\u00e9er des utilisateurs qui sont\n membres de groupes arbitraires et par ce biais, d\u0027\u00e9lever les\n privil\u00e8ges. L\u0027exploitation de cette vuln\u00e9rabilit\u00e9 requiert des\n droits de cr\u00e9ation d\u0027utilisateurs dans le centre de t\u00e2ches ;\n- un probl\u00e8me dans la fonction PHP filter_var() permet la r\u00e9alisation\n d\u0027un d\u00e9ni de service \u00e0 distance lorsque la fonction\n t3lib_div::validEMail() est utilis\u00e9e ;\n- une injection de code indirecte est possible via la fonction\n RemoveXSS.\n\n## Solution\n\nMettre \u00e0 jour TYPO3 en version 4.2.15, 4.3.7 ou 4.4.4.\n", "cves": [ { "name": "CVE-2010-3710", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3710" }, { "name": "CVE-2010-3715", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3715" }, { "name": "CVE-2010-3716", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3716" }, { "name": "CVE-2010-4068", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4068" }, { "name": "CVE-2010-3717", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3717" }, { "name": "CVE-2010-3714", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3714" } ], "initial_release_date": "2010-10-07T00:00:00", "last_revision_date": "2010-10-27T00:00:00", "links": [], "reference": "CERTA-2010-AVI-474", "revisions": [ { "description": "version initiale.", "revision_date": "2010-10-07T00:00:00.000000" }, { "description": "ajout des r\u00e9f\u00e9rences CVE.", "revision_date": "2010-10-27T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s dans \u003cspan class=\"textit\"\u003eTYPO3\u003c/span\u003e\npermettent un d\u00e9ni de service \u00e0 distance, la lecture de certains\nfichiers du syst\u00e8me, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de\ncode indirecte \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans TYPO3", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 TYPO3-SA-2010-020 du 06 octobre 2010", "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ] }
CVE-2010-3714 (GCVE-0-2010-3714)
Vulnerability from cvelistv5
Published
2010-10-25 19:00
Modified
2024-08-07 03:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The jumpUrl (aka access tracking) implementation in tslib/class.tslib_fe.php in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly compare certain hash values during access-control decisions, which allows remote attackers to read arbitrary files via unspecified vectors.
References
URL | Tags | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43786", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43786" }, { "name": "15856", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/15856" }, { "name": "DSA-2121", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2121" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The jumpUrl (aka access tracking) implementation in tslib/class.tslib_fe.php in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly compare certain hash values during access-control decisions, which allows remote attackers to read arbitrary files via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-06-01T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "43786", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43786" }, { "name": "15856", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/15856" }, { "name": "DSA-2121", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2121" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3714", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The jumpUrl (aka access tracking) implementation in tslib/class.tslib_fe.php in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly compare certain hash values during access-control decisions, which allows remote attackers to read arbitrary files via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43786", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43786" }, { "name": "15856", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/15856" }, { "name": "DSA-2121", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2121" }, { "name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/", "refsource": "CONFIRM", "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" }, { "name": "http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html", "refsource": "MISC", "url": "http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3714", "datePublished": "2010-10-25T19:00:00", "dateReserved": "2010-10-01T00:00:00", "dateUpdated": "2024-08-07T03:18:53.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3715 (GCVE-0-2010-3715)
Vulnerability from cvelistv5
Published
2010-10-25 19:00
Modified
2024-09-17 03:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the RemoveXSS function, and allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (2) the backend.
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43786", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2121" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the RemoveXSS function, and allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (2) the backend." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-10-25T19:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "43786", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2121" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3715", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the RemoveXSS function, and allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (2) the backend." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43786", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2121" }, { "name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/", "refsource": "CONFIRM", "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3715", "datePublished": "2010-10-25T19:00:00Z", "dateReserved": "2010-10-01T00:00:00Z", "dateUpdated": "2024-09-17T03:32:35.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3717 (GCVE-0-2010-3717)
Vulnerability from cvelistv5
Published
2010-10-25 19:00
Modified
2024-09-16 16:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The t3lib_div::validEmail function in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly restrict input to filter_var FILTER_VALIDATE_EMAIL operations in PHP, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string, a related issue to CVE-2010-3710.
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:52.801Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43786", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2121" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The t3lib_div::validEmail function in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly restrict input to filter_var FILTER_VALIDATE_EMAIL operations in PHP, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string, a related issue to CVE-2010-3710." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-10-25T19:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "43786", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2121" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3717", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The t3lib_div::validEmail function in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly restrict input to filter_var FILTER_VALIDATE_EMAIL operations in PHP, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string, a related issue to CVE-2010-3710." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43786", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2121" }, { "name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/", "refsource": "CONFIRM", "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3717", "datePublished": "2010-10-25T19:00:00Z", "dateReserved": "2010-10-01T00:00:00Z", "dateUpdated": "2024-09-16T16:47:44.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3710 (GCVE-0-2010-3710)
Vulnerability from cvelistv5
Published
2010-10-25 19:00
Modified
2024-08-07 03:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0077", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0077" }, { "name": "FEDORA-2010-19011", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html" }, { "name": "42812", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42812" }, { "name": "HPSBOV02763", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469208622507\u0026w=2" }, { "name": "RHSA-2011:0196", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0196.html" }, { "name": "MDVSA-2010:218", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:218" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.php.net/releases/5_3_4.php" }, { "name": "43926", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43926" }, { "name": "SUSE-SR:2010:023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "name": "APPLE-SA-2011-03-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "USN-1042-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1042-1" }, { "name": "ADV-2011-0021", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0021" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.php.net/ChangeLog-5.php" }, { "name": "SSRT100826", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469208622507\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.php.net/archive/2010.php#id2010-12-10-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.php.net/releases/5_2_15.php" }, { "name": "FEDORA-2010-18976", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.php.net/bug.php?id=52929" }, { "name": "ADV-2011-0020", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0020" }, { "name": "43189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43189" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-08-19T15:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2011-0077", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0077" }, { "name": "FEDORA-2010-19011", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html" }, { "name": "42812", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42812" }, { "name": "HPSBOV02763", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469208622507\u0026w=2" }, { "name": "RHSA-2011:0196", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0196.html" }, { "name": "MDVSA-2010:218", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:218" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.php.net/releases/5_3_4.php" }, { "name": "43926", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43926" }, { "name": "SUSE-SR:2010:023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "name": "APPLE-SA-2011-03-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "USN-1042-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1042-1" }, { "name": "ADV-2011-0021", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0021" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.php.net/ChangeLog-5.php" }, { "name": "SSRT100826", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469208622507\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.php.net/archive/2010.php#id2010-12-10-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.php.net/releases/5_2_15.php" }, { "name": "FEDORA-2010-18976", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.php.net/bug.php?id=52929" }, { "name": "ADV-2011-0020", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0020" }, { "name": "43189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43189" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4581" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3710", "datePublished": "2010-10-25T19:00:00", "dateReserved": "2010-10-01T00:00:00", "dateUpdated": "2024-08-07T03:18:53.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4068 (GCVE-0-2010-4068)
Vulnerability from cvelistv5
Published
2010-10-25 19:00
Modified
2024-09-16 17:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the Extension Manager in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 allows remote authenticated administrators to read and possibly modify arbitrary files via a crafted parameter, a different vulnerability than CVE-2010-3714.
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:36.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43786", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2121" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Extension Manager in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 allows remote authenticated administrators to read and possibly modify arbitrary files via a crafted parameter, a different vulnerability than CVE-2010-3714." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-10-25T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "43786", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2121" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4068", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Extension Manager in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 allows remote authenticated administrators to read and possibly modify arbitrary files via a crafted parameter, a different vulnerability than CVE-2010-3714." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43786", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2121" }, { "name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/", "refsource": "CONFIRM", "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4068", "datePublished": "2010-10-25T19:00:00Z", "dateReserved": "2010-10-25T00:00:00Z", "dateUpdated": "2024-09-16T17:03:21.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3716 (GCVE-0-2010-3716)
Vulnerability from cvelistv5
Published
2010-10-25 19:00
Modified
2024-09-16 18:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The be_user_creation task in TYPO3 4.2.x before 4.2.15 and 4.3.x before 4.3.7 allows remote authenticated users to gain privileges via a crafted POST request that creates a user account with arbitrary group memberships.
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43786", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2121" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The be_user_creation task in TYPO3 4.2.x before 4.2.15 and 4.3.x before 4.3.7 allows remote authenticated users to gain privileges via a crafted POST request that creates a user account with arbitrary group memberships." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-10-25T19:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "43786", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2121" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3716", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The be_user_creation task in TYPO3 4.2.x before 4.2.15 and 4.3.x before 4.3.7 allows remote authenticated users to gain privileges via a crafted POST request that creates a user account with arbitrary group memberships." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43786", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43786" }, { "name": "DSA-2121", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2121" }, { "name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/", "refsource": "CONFIRM", "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3716", "datePublished": "2010-10-25T19:00:00Z", "dateReserved": "2010-10-01T00:00:00Z", "dateUpdated": "2024-09-16T18:29:17.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…