TYPO3 4.0.x before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.2.1, uses an insufficiently restrictive default fileDenyPattern for Apache, which allows remote attackers to bypass security restrictions and upload configuration files such as .htaccess, or conduct file upload attacks using multiple extensions.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://buzz.typo3.org/teams/security/article/advice-on-core-security-issue-regarding-filedenypattern/ - | |
References | () http://secunia.com/advisories/30619 - Vendor Advisory | |
References | () http://secunia.com/advisories/30660 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/3945 - | |
References | () http://typo3.org/teams/security/security-bulletins/typo3-20080611-1/ - | |
References | () http://www.debian.org/security/2008/dsa-1596 - | |
References | () http://www.securityfocus.com/archive/1/493270/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/29657 - | |
References | () http://www.vupen.com/english/advisories/2008/1802 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42988 - |
Information
Published : 2008-06-16 22:41
Updated : 2024-11-21 00:47
NVD link : CVE-2008-2717
Mitre link : CVE-2008-2717
CVE.ORG link : CVE-2008-2717
JSON object : View
Products Affected
apache
- apache_webserver
typo3
- typo3
CWE
CWE-264
Permissions, Privileges, and Access Controls