CVE-2012-1078
 
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The System Utilities (sysutils) extension 1.0.3 and earlier for TYPO3 allows remote attackers to obtain sensitive information via unspecified vectors related to improper "protection" of the "backup output directory."
La extensión System Utilities (sysutils) v1.0.3 y anteriores para TYPO3, permite a atacantes remotos obtener información sensible a través de vectores no especificados relacionados con la "protección" impropia del "directorio de salida de copia de seguridad"
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2012-02-14 CVE Reserved
- 2012-02-14 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://typo3.org/extensions/repository/view/sysutils/1.0.4 | X_refsource_confirm | |
http://www.osvdb.org/78791 | Vdb Entry | |
http://www.securityfocus.com/bid/51844 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72964 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001 | 2017-08-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Claus Due Search vendor "Claus Due" | Sysutils Search vendor "Claus Due" for product "Sysutils" | <= 1.0.3 Search vendor "Claus Due" for product "Sysutils" and version " <= 1.0.3" | - |
Affected
| in | Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | * | - |
Safe
|
Claus Due Search vendor "Claus Due" | Sysutils Search vendor "Claus Due" for product "Sysutils" | 0.10.0 Search vendor "Claus Due" for product "Sysutils" and version "0.10.0" | - |
Affected
| in | Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | * | - |
Safe
|
Claus Due Search vendor "Claus Due" | Sysutils Search vendor "Claus Due" for product "Sysutils" | 1.0.0 Search vendor "Claus Due" for product "Sysutils" and version "1.0.0" | - |
Affected
| in | Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | * | - |
Safe
|
Claus Due Search vendor "Claus Due" | Sysutils Search vendor "Claus Due" for product "Sysutils" | 1.0.1 Search vendor "Claus Due" for product "Sysutils" and version "1.0.1" | - |
Affected
| in | Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | * | - |
Safe
|
Claus Due Search vendor "Claus Due" | Sysutils Search vendor "Claus Due" for product "Sysutils" | 1.0.2 Search vendor "Claus Due" for product "Sysutils" and version "1.0.2" | - |
Affected
| in | Typo3 Search vendor "Typo3" | Typo3 Search vendor "Typo3" for product "Typo3" | * | - |
Safe
|