Summary
This host is installed with TYPO3 and is prone to cross site scripting vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
No solution or patch is available as of 20th February, 2015. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://typo3.org/
Insight
Flaw is due to improper validation of user-supplied input passed to 'RTEtsConfigParams' parameter in 'select_image.php' page.
Affected
TYPO3 6.1.7, previous versions may also be affected.
Detection
Send a crafted HTTP GET request and check whether it is able to read the cookie or not.
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache Tomcat RemoteFilterValve Security Bypass Vulnerability
- Apache Tomcat cal2.jsp Cross Site Scripting Vulnerability
- @Mail 'MailType' Parameter Cross Site Scripting Vulnerability
- Apache ActiveMQ 'admin/queueBrowse' Cross Site Scripting Vulnerability
- 1024 CMS 1.1.0 Beta 'force_download.php' Local File Include Vulnerability