Summary
This host is installed with TYPO3 and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code or steal the victim's cookie-based authentication credentials.
Impact Level: Application
Solution
Upgrade to TYPO3 version 4.0.10, 4.1.8, 4.2.4 or later, For updates refer to, http://typo3.org/
Insight
Multiple error exists in the application,
- An error exist in Indexed Search Engine system extension which fails to validate user-supplied input properly.
- An error exist in session tokens, which is caused by the improper validation.
- An error exist in Workspace module which fails to validate user-supplied input properly.
Affected
TYPO3 versions 4.0.0 to 4.0.9, 4.1.0 to 4.1.7, 4.2.0 to 4.2.3
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2009-0255, CVE-2009-0256, CVE-2009-0257, CVE-2009-0258 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- ASAS Server End User Self Service (EUSS) SQL Injection Vulnerability
- Artifectx xClassified 'catid' SQL Injection Vulnerability
- Atutor AChecker Multiple SQL Injection and XSS Vulnerabilities
- Andy's PHP Knowledgebase 's' Parameter SQL Injection Vulnerability
- Apache Solr XML External Entity(XXE) Vulnerability-02 Jan-14