view_help.php in the backend help system in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote authenticated backend users to unserialize arbitrary objects and possibly execute arbitrary PHP code via an unspecified parameter, related to a "missing signature (HMAC)."
References
Link | Resource |
---|---|
http://osvdb.org/84773 | Broken Link |
http://secunia.com/advisories/50287 | Not Applicable |
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/ | Vendor Advisory |
http://www.debian.org/security/2012/dsa-2537 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/08/22/8 | Mailing List |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77791 | Third Party Advisory VDB Entry |
http://osvdb.org/84773 | Broken Link |
http://secunia.com/advisories/50287 | Not Applicable |
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/ | Vendor Advisory |
http://www.debian.org/security/2012/dsa-2537 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/08/22/8 | Mailing List |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77791 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 01:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/84773 - Broken Link | |
References | () http://secunia.com/advisories/50287 - Not Applicable | |
References | () http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/ - Vendor Advisory | |
References | () http://www.debian.org/security/2012/dsa-2537 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2012/08/22/8 - Mailing List | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/77791 - Third Party Advisory, VDB Entry |
21 Jan 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | (OSVDB) http://osvdb.org/84773 - Broken Link | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/77791 - Third Party Advisory, VDB Entry | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2012/08/22/8 - Mailing List | |
References | (SECUNIA) http://secunia.com/advisories/50287 - Not Applicable | |
References | (DEBIAN) http://www.debian.org/security/2012/dsa-2537 - Third Party Advisory | |
CWE | CWE-502 | |
First Time |
Debian debian Linux
Debian |
|
CPE | cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.7:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:* |
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* |
Information
Published : 2012-09-05 23:55
Updated : 2024-11-21 01:41
NVD link : CVE-2012-3527
Mitre link : CVE-2012-3527
CVE.ORG link : CVE-2012-3527
JSON object : View
Products Affected
typo3
- typo3
debian
- debian_linux
CWE
CWE-502
Deserialization of Untrusted Data