Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
we track for your security since 1999
  home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.
recent vulnerabilities recent vulnerabilities
tracked products tracked products
RSS feed RSS feed
vulnerability

vulnerability 14235

TYPO3 Direct Mail Subscription: SQL injection of feuser_adminLib.inc

Synthesis of the vulnerability

An attacker can use a SQL injection in feuser_adminLib.inc of TYPO3 Direct Mail Subscription, in order to read or alter data.
Impacted products: TYPO3 Extensions.
Severity: 2/4.
Creation date: 12/02/2014.
Identifiers: BID-65580, TYPO3-EXT-SA-2014-004, VIGILANCE-VUL-14235.

Description of the vulnerability

The TYPO3 Direct Mail Subscription product uses a database.

However, user's data are directly inserted in a SQL query via feuser_adminLib.inc.

An attacker can therefore use a SQL injection in feuser_adminLib.inc of TYPO3 Direct Mail Subscription, in order to read or alter data.
Complete Vigil@nce bulletin.... (free access)

Share this bulletin

Delicious Digg Facebook Google bookmarks LinkedIn Mail Reddit StumbleUpon Technorati Twitter 

Computer vulnerabilities tracking service

Vigil@nce provides computers vulnerabilities analysis. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française