The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/ - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2009/dsa-1720 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2009/02/10/6 - | |
References | () http://www.securitytracker.com/id?1021710 - |
Information
Published : 2009-03-05 02:30
Updated : 2024-11-21 01:00
NVD link : CVE-2009-0815
Mitre link : CVE-2009-0815
CVE.ORG link : CVE-2009-0815
JSON object : View
Products Affected
typo3
- typo3
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor