Summary
This host is installed with TYPO3 and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to steal the victim's cookie-based authentication credentials or get sensitive information.
Impact Level: Application
Solution
Upgrade to TYPO3 version 4.5.19, 4.6.12, 4.7.4 or later, For updates refer to, http://typo3.org/
Insight
Multiple error exists in the application,
- An error exist in backend help system, which misses a signature (HMAC) for a parameter in the view_help.php file.
- An error exist in the application, which fails to HTML-encode user input in several places
- An error exist in typo3 backend, which exposes Encryption Key when configuration module is accessed.
- An error exist in API method t3lib_div::RemoveXSS(), which fails to filter specially crafted HTML injections.
- An error exist in Install Tool, which fails to sanitize user input properly.
Affected
TYPO3 version 4.5.0 up to 4.5.18, 4.6.0 up to 4.6.11, 4.7.0 up to 4.7.3
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2012-3527, CVE-2012-3528, CVE-2012-3529, CVE-2012-3530, CVE-2012-3531 -
CVSS Base Score: 4.6
AV:N/AC:H/Au:S/C:P/I:P/A:P
Related Vulnerabilities
- Apache Solr Directory Traversal Vulnerability Jan-14
- APC PowerChute Network Shutdown 'security/applet' Cross Site Scripting Vulnerability
- Adiscon LogAnalyzer 'highlight' Parameter Cross Site Scripting Vulnerability
- Aardvark Topsites <= 4.2.2 Remote File Inclusion Vulnerability
- Apache ActiveMQ 'Cron Jobs' Cross Site Scripting Vulnerability