First published: Sat Dec 15 2007(Updated: )
SQL injection vulnerability in the indexed_search system extension in TYPO3 3.x, 4.0 through 4.0.7, and 4.1 through 4.1.3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TYPO3 | ||
TYPO3 | =3.0 | |
TYPO3 | =3.7.0 | |
TYPO3 | =3.7.1 | |
TYPO3 | =3.8 | |
TYPO3 | =3.8.1 | |
TYPO3 | =4.0 | |
TYPO3 | =4.0.1 | |
TYPO3 | =4.0.2 | |
TYPO3 | =4.0.3 | |
TYPO3 | =4.0.4 | |
TYPO3 | =4.0.5 | |
TYPO3 | =4.0.6 | |
TYPO3 | =4.0.7 | |
TYPO3 | =4.1 | |
TYPO3 | =4.1.1 | |
TYPO3 | =4.1.2 | |
TYPO3 | =4.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6381 is considered a high severity SQL injection vulnerability that allows attackers to execute arbitrary SQL commands.
To fix CVE-2007-6381, you should upgrade TYPO3 to the latest version that is not affected by this vulnerability.
CVE-2007-6381 affects TYPO3 versions 3.x, 4.0 through 4.0.7, and 4.1 through 4.1.3.
Remote authenticated users are at risk with CVE-2007-6381 as they can leverage this vulnerability to perform SQL injection attacks.
The implications of CVE-2007-6381 include potential unauthorized access to sensitive data and manipulation of the database.