Unspecified vulnerability in the powermail extension 1.5.3 and earlier for TYPO3 allows remote attackers to bypass validation have an unspecified impact by "[injecting] arbitrary values into validated fields," as demonstrated using the (1) Email and (2) URL fields.
References
Link | Resource |
---|---|
http://secunia.com/advisories/41530 | Vendor Advisory |
http://typo3.org/extensions/repository/view/powermail/1.5.4 | |
http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-019 | Patch Vendor Advisory |
http://secunia.com/advisories/41530 | Vendor Advisory |
http://typo3.org/extensions/repository/view/powermail/1.5.4 | |
http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-019 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/41530 - Vendor Advisory | |
References | () http://typo3.org/extensions/repository/view/powermail/1.5.4 - | |
References | () http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-019 - Patch, Vendor Advisory |
Information
Published : 2010-09-29 17:00
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3687
Mitre link : CVE-2010-3687
CVE.ORG link : CVE-2010-3687
JSON object : View
Products Affected
alex_kellner
- powermail
typo3
- typo3
CWE