Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title New TYPO3 packages fix several vulnerabilities
Informations
Name DSA-1720 First vendor Publication 2009-02-10
Vendor Debian Last vendor Modification 2009-02-10
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several remote vulnerabilities have been discovered in the TYPO3 web content management framework.

Marcus Krause and Michael Stucki from the TYPO3 security team discovered that the jumpUrl mechanism discloses secret hashes enabling a remote attacker to bypass access control by submitting the correct value as a URL parameter and thus being able to read the content of arbitrary files.

Jelmer de Hen and Dmitry Dulepov discovered multiple cross-site scripting vulnerabilities in the backend user interface allowing remote attackers to inject arbitrary web script or HTML.

As it is very likely that your encryption key has been exposed we strongly recommend to change your encyption key via the install tool after installing the update.

For the stable distribution (etch) these problems have been fixed in version 4.0.2+debian-8.

For the testing distribution (lenny) these problems have been fixed in version 4.2.5-1+lenny1.

For the unstable distribution (sid) these problems have been fixed in version 4.2.6-1.

We recommend that you upgrade your typo3 package.

Original Source

Url : http://www.debian.org/security/2009/dsa-1720

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-200 Information Exposure
50 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 36

OpenVAS Exploits

Date Description
2009-02-13 Name : Debian Security Advisory DSA 1720-1 (typo3-src)
File : nvt/deb_1720_1.nasl
2009-02-13 Name : FreeBSD Ports: typo3
File : nvt/freebsd_typo30.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
52050 TYPO3 Backend Unspecified XSS

52048 TYPO3 class.tslib_fe.php 3 jump_url Function Arbitrary File Access

Typo3 contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered due to an error in the jumpUrl mechanism, which will disclose a hash secret, allowing for arbitrary file access, resulting in a loss of confidentiality.

Nessus® Vulnerability Scanner

Date Description
2009-02-12 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1720.nasl - Type : ACT_GATHER_INFO
2009-02-12 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_cc47fafef82311dd94d90030843d3802.nasl - Type : ACT_GATHER_INFO
2009-02-12 Name : The remote web server contains a PHP script that is affected by an informatio...
File : typo3_jumpurl_info_disclosure.nasl - Type : ACT_ATTACK

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:28:11
  • Multiple Updates