CVE-2010-5099

The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly filter file types, which allows remote attackers to bypass intended access restrictions and access arbitrary PHP files, as demonstrated using path traversal sequences with %00 null bytes and CVE-2010-3714 to read the TYPO3 encryption key from localconf.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.10:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.11:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.12:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.13:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.14:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.2.15:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.8:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:typo3:typo3:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:22

Type Values Removed Values Added
References () http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html - Exploit () http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html - Exploit
References () http://secunia.com/advisories/35770 - Vendor Advisory () http://secunia.com/advisories/35770 - Vendor Advisory
References () http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/ - Vendor Advisory () http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/ - Vendor Advisory
References () http://www.exploit-db.com/exploits/15856 - Exploit () http://www.exploit-db.com/exploits/15856 - Exploit
References () http://www.openwall.com/lists/oss-security/2011/01/13/2 - () http://www.openwall.com/lists/oss-security/2011/01/13/2 -
References () http://www.openwall.com/lists/oss-security/2012/05/10/7 - () http://www.openwall.com/lists/oss-security/2012/05/10/7 -
References () http://www.openwall.com/lists/oss-security/2012/05/11/3 - () http://www.openwall.com/lists/oss-security/2012/05/11/3 -
References () http://www.openwall.com/lists/oss-security/2012/05/12/5 - () http://www.openwall.com/lists/oss-security/2012/05/12/5 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/64180 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/64180 -

Information

Published : 2012-05-30 20:55

Updated : 2024-11-21 01:22


NVD link : CVE-2010-5099

Mitre link : CVE-2010-5099

CVE.ORG link : CVE-2010-5099


JSON object : View

Products Affected

typo3

  • typo3
CWE
CWE-20

Improper Input Validation