The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of TYPO3: several vulnerabilities

Synthesis of the vulnerability 

An attacker can use several vulnerabilities of TYPO3, in order to create a Cross Site Scripting, to inject SQL code, or to execute commands.
Impacted software: TYPO3 Core.
Severity of this computer vulnerability: 3/4.
Number of vulnerabilities in this bulletin: 9.
Creation date: 22/10/2009.
Références of this announce: BID-36801, CVE-2009-3628, CVE-2009-3629, CVE-2009-3630, CVE-2009-3631, CVE-2009-3632, CVE-2009-3633, CVE-2009-3634, CVE-2009-3635, CVE-2009-3636, TYPO3-SA-2009-016, VIGILANCE-VUL-9112.

Description of the vulnerability 

Several vulnerabilities were announced in TYPO3.

An authenticated attacker can use the tt_content field to compute the encryption key, in order to obtain sensitive data. [severity:2/4; CVE-2009-3628]

An attacker can use several Cross Site Scripting of the Backend. [severity:2/4; CVE-2009-3629]

An authenticated attacker can include external web sites in the TYPO3 interface. [severity:1/4; CVE-2009-3630]

An attacker can upload files with DAM or FTP, whose names lead to shell command execution. [severity:3/4; CVE-2009-3631]

An authenticated attacker can generate a SQL injection in the traditional edition frontend. [severity:2/4; CVE-2009-3632]

The t3lib_div::quoteJSvalue() function does not correcly filter data, which can lead to a Cross Site Scripting. [severity:2/4; CVE-2009-3633]

An attacker can generate a Cross Site Scripting in the login interface. [severity:2/4; CVE-2009-3634]

An attacker, who knows the md5 hash of the Install Tool password, can authenticate. [severity:1/4; CVE-2009-3635]

An attacker can generate a Cross Site Scripting in the Install Tool. [severity:2/4; CVE-2009-3636]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability bulletin impacts software or systems such as TYPO3 Core.

Our Vigil@nce team determined that the severity of this security note is important.

The trust level is of type confirmed by the editor, with an origin of internet client.

This bulletin is about 9 vulnerabilities.

An attacker with a expert ability can exploit this cybersecurity note.

Solutions for this threat 

TYPO3: version 4.2.10.
Version 4.2.10 is corrected:
  http://typo3.org/

TYPO3: version 4.1.13.
Version 4.1.13 is corrected:
  http://typo3.org/
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a cybersecurity announce. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.