[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1711 typo3-src -- several vulnerabilities

ID: oval:org.mitre.oval:def:8128Date: (C)2009-12-15   (M)2024-02-19
Class: PATCHFamily: unix




Several remotely exploitable vulnerabilities have been discovered in the TYPO3 web content management framework. The Common Vulnerabilities and Exposures project identifies the following problems: Chris John Riley discovered that the TYPO3-wide used encryption key is generated with an insufficiently random seed resulting in low entropy which makes it easier for attackers to crack this key. Marcus Krause discovered that TYPO3 is not invalidating a supplied session on authentication which allows an attacker to take over a victims session via a session fixation attack. Multiple cross-site scripting vulnerabilities allow remote attackers to inject arbitrary web script or HTML via various arguments and user supplied strings used in the indexed search system extension, adodb extension test scripts or the workspace module. Mads Olesen discovered a remote command injection vulnerability in the indexed search system extension which allows attackers to execute arbitrary code via a crafted file name which is passed unescaped to various system tools that extract file content for the indexing. Because of CVE-2009-0255, please make sure that besides installing this update, you also create a new encryption key after the installation.

Platform:
Debian 4.0
Product:
typo3-src
Reference:
DSA-1711
CVE-2009-0255
CVE-2009-0256
CVE-2009-0257
CVE-2009-0258
CVE    4
CVE-2009-0257
CVE-2009-0256
CVE-2009-0258
CVE-2009-0255
...
CPE    1
cpe:/o:debian:debian_linux:4.0

© SecPod Technologies