[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-5099

Date: (C)2012-05-30   (M)2017-08-29
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly filter file types, which allows remote attackers to bypass intended access restrictions and access arbitrary PHP files, as demonstrated using path traversal sequences with %00 null bytes and CVE-2010-3714 to read the TYPO3 encryption key from localconf.php.

Reference:
EXPLOIT-DB-15856
SECUNIA-35770
http://www.openwall.com/lists/oss-security/2011/01/13/2
http://www.openwall.com/lists/oss-security/2012/05/11/3
http://www.openwall.com/lists/oss-security/2012/05/10/7
http://www.openwall.com/lists/oss-security/2012/05/12/5
http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/
typo3-unspecified-file-include(64180)

CPE    30
cpe:/a:typo3:typo3:4.2.5
cpe:/a:typo3:typo3:4.2.10
cpe:/a:typo3:typo3:4.2.4
cpe:/a:typo3:typo3:4.2.11
...
CWE    1
CWE-20

© 2013 SecPod Technologies