Summary
This host is installed with TYPO3 and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code or steal the victim's cookie-based authentication credentials.
Impact Level: Application
Solution
Upgrade to TYPO3 version 4.0.10, 4.1.8, 4.2.4 or later, For updates refer to, http://typo3.org/
Insight
Multiple error exists in the application,
- An error exist in Indexed Search Engine system extension which fails to validate user-supplied input properly.
- An error exist in session tokens, which is caused by the improper validation.
- An error exist in Workspace module which fails to validate user-supplied input properly.
Affected
TYPO3 versions 4.0.0 to 4.0.9, 4.1.0 to 4.1.7, 4.2.0 to 4.2.3
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2009-0255, CVE-2009-0256, CVE-2009-0257, CVE-2009-0258 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adiscon LogAnalyzer Multiple SQL Injection and XSS Vulnerabilities
- Avenger's News System Command Execution
- Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability
- AV Arcade 'ava_code' Cookie Parameter SQL Injection Vulnerability
- AlienVault OSSIM SQL Injection and Remote Code Execution Vulnerabilities