Summary
This host is installed with TYPO3 and is prone to arbitrary mail relay vulnerability.
Impact
Successful exploitation will allow remote attackers to send mail to a wrong receipient.
Impact Level: Application
Solution
Apply the patch mentioned in the below link
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-20050307-1
Insight
An error exists in the application, which uses default encryption key unless it is changed by administrator
Affected
TYPO3 version 3.7.0 and before
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apache Commons Daemon 'jsvc' Information Disclosure Vulnerability
- AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities
- Advanced Image Hosting Cross Site Scripting Vulnerability
- Apache Tiles Multiple XSS Vulnerability
- Apache OFBiz Multiple Cross Site Scripting Vulnerabilities