Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-4068 | First vendor Publication | 2010-10-25 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:S/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.9 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Medium |
Cvss Expoit Score | 6.8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Unspecified vulnerability in the Extension Manager in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 allows remote authenticated administrators to read and possibly modify arbitrary files via a crafted parameter, a different vulnerability than CVE-2010-3714. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4068 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2010-11-17 | Name : Debian Security Advisory DSA 2121-1 (typo3-src) File : nvt/deb_2121_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
69218 | TYPO3 Extension Manager Unspecified Arbitrary File Access TYPO3 contains a flaw related to the Extension Manager that may allow a remote authenticated attacker to use a crafted parameter to access and potentially modify arbitrary files under unspecified specific circumstances. No further details have been provided. |
68593 | TYPO3 typo3/sysext/em/mod1/class.em_index.php Unspecified Traversal Arbitrary... TYPO3 contains a flaw that allows a remote, authenticated attacker to traverse outside of a restricted path. The issue is due to the typo3/sysext/em/mod1/class.em_index.php not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../). This directory traversal attack would allow the attacker to access arbitrary files. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-10-20 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2121.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 23:07:09 |
|
2024-11-28 12:23:27 |
|
2021-05-04 12:12:31 |
|
2021-04-22 01:13:24 |
|
2020-05-23 00:26:49 |
|
2013-05-10 23:36:04 |
|