CVE-2008-2717
 
Severity Score
6.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
TYPO3 4.0.x before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.2.1, uses an insufficiently restrictive default fileDenyPattern for Apache, which allows remote attackers to bypass security restrictions and upload configuration files such as .htaccess, or conduct file upload attacks using multiple extensions.
TYPO3 versiones 4.0.x anteriores a 4.0.9, versiones 4.1.x anteriores a 4.1.7, y versiones 4.2.x anteriores a 4.2.1, utiliza un fileDenyPattern predeterminado insuficientemente restrictivo para Apache, que permite a los atacantes remotos omitir las restricciones de seguridad y cargar archivos de configuraciĆ³n como .htaccess, o conducir ataques de carga de archivos mediante varias extensiones.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-06-16 CVE Reserved
- 2008-06-16 CVE Published
- 2024-06-22 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://buzz.typo3.org/teams/security/article/advice-on-core-security-issue-regarding-filedenypattern | X_refsource_confirm | |
http://securityreason.com/securityalert/3945 | Third Party Advisory | |
http://typo3.org/teams/security/security-bulletins/typo3-20080611-1 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/493270/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/29657 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/1802 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42988 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/30619 | 2018-10-11 | |
http://secunia.com/advisories/30660 | 2018-10-11 | |
http://www.debian.org/security/2008/dsa-1596 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Apache Webserver Search vendor "Apache" for product "Apache Webserver" | * | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.0 Search vendor "Typo3" for product "Typo3" and version "4.0" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.0.1 Search vendor "Typo3" for product "Typo3" and version "4.0.1" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.0.2 Search vendor "Typo3" for product "Typo3" and version "4.0.2" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.0.3 Search vendor "Typo3" for product "Typo3" and version "4.0.3" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.0.4 Search vendor "Typo3" for product "Typo3" and version "4.0.4" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.0.5 Search vendor "Typo3" for product "Typo3" and version "4.0.5" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.0.6 Search vendor "Typo3" for product "Typo3" and version "4.0.6" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.0.7 Search vendor "Typo3" for product "Typo3" and version "4.0.7" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.0.8 Search vendor "Typo3" for product "Typo3" and version "4.0.8" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.1 Search vendor "Typo3" for product "Typo3" and version "4.1" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.1.1 Search vendor "Typo3" for product "Typo3" and version "4.1.1" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.1.2 Search vendor "Typo3" for product "Typo3" and version "4.1.2" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.1.3 Search vendor "Typo3" for product "Typo3" and version "4.1.3" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.1.4 Search vendor "Typo3" for product "Typo3" and version "4.1.4" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.1.5 Search vendor "Typo3" for product "Typo3" and version "4.1.5" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.1.6 Search vendor "Typo3" for product "Typo3" and version "4.1.6" | - |
Affected
| ||||||
Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | 4.2 Search vendor "Typo3" for product "Typo3" and version "4.2" | - |
Affected
|