Page 21 of 487 results (0.008 seconds)

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 0

PharMetaDataInterceptor in the PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 mishandles Phar stub parsing, which allows attackers to bypass a deserialization protection mechanism. PharMetaDataInterceptor en el paquete PharStreamWrapper (también conocido como phar-stream-wrapper), versiones 2.x anteriores a 2.1.1 y 3.x anteriores a 3.1.1 para TYPO3, maneja mal el análisis de Phar stub, lo que permite a los atacantes eludir un mecanismo de protección de deserialización. • https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1 https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523 https://typo3.org/security • CWE-502: Deserialization of Untrusted Data •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 2

The page module in TYPO3 before 8.7.11, and 9.1.0, has XSS via $GLOBALS['TYPO3_CONF_VARS']['SYS']['sitename'], as demonstrated by an admin entering a crafted site name during the installation process. El módulo page en TYPO3, en versiones anteriores a la 8.7.11 y versiones 9.1.0,. tiene Cross-Site Scripting (XSS) mediante $GLOBALS['TYPO3_CONF_VARS']['SYS']['sitename'], tal y como queda demostrado con un administrador que introduce un nombre de sitio manipulado durante el proceso de instalación. • https://github.com/dnr6419/CVE-2018-6905 http://www.securitytracker.com/id/1040755 https://forge.typo3.org/issues/84191 https://github.com/pradeepjairamani/TYPO3-XSS-POC • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 32EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 CMS 4.1.x before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4, and 4.4.x before 4.4.1 allow remote authenticated backend users to inject arbitrary web script or HTML via unspecified parameters to the extension manager, or unspecified parameters to unknown backend forms. Múltiples vulnerabilidades de Cross-Site Scripting (XSS) en TYPO3 CMS en versiones 4.1.x anteriores a la 4.1.14, versiones 4.2.x anteriores a la 4.2.13, versiones 4.3.x anteriores a la 4.3.4 y versiones 4.4.x anteriores a la 4.4.1 permite que usuarios remotos backend inyecten scripts web o HTML arbitrarios mediante parámetros sin especificar en el gestor de extensiones, o parámetros sin especificar en formularios de backend desconocidos. • http://www.openwall.com/lists/oss-security/2010/09/28/8 http://www.openwall.com/lists/oss-security/2014/02/12/8 http://www.securityfocus.com/bid/42029 https://security-tracker.debian.org/tracker/CVE-2010-3659 https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 42EXPL: 1

Unrestricted File Upload vulnerability in the fileDenyPattern in sysext/core/Classes/Core/SystemEnvironmentBuilder.php in TYPO3 7.6.0 to 7.6.21 and 8.0.0 to 8.7.4 allows remote authenticated users to upload files with a .pht extension and consequently execute arbitrary PHP code. Una vulnerabilidad de subida de archivos sin restricciones en fileDenyPattern en sysext/core/Classes/Core/SystemEnvironmentBuilder.php en TYPO3 para las versiones 7.6.0 a 7.6.21 y 8.0.0 a 8.7.4 permite a los usuarios autenticados remotos subir archivos con una extensión .pht y, como consecuencia, ejecutar código PHP arbitrario. • http://blog.emaze.net/2017/12/typo3-unrestricted-file-upload-remote.html http://www.securityfocus.com/bid/100620 http://www.securitytracker.com/id/1039295 https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2017-007 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

TYPO3 7.6.15 sends an http request to an index.php?loginProvider URI in cases with an https Referer, which allows remote attackers to obtain sensitive cleartext information by sniffing the network and reading the userident and username fields. TYPO3 7.6.15 envía una solicitud http a un index.php?loginProvider URI en casos con un httpsReferers, lo que permite a atacantes remotos obtener información de texto plano sensible husmeando la red y leyendo los campos userident y username. • http://www.securityfocus.com/bid/97071 https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request • CWE-319: Cleartext Transmission of Sensitive Information •