First published: Mon Jun 16 2008(Updated: )
TYPO3 4.0.x before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.2.1, uses an insufficiently restrictive default fileDenyPattern for Apache, which allows remote attackers to bypass security restrictions and upload configuration files such as .htaccess, or conduct file upload attacks using multiple extensions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Typo3 Typo3 | =4.1.1 | |
Typo3 Typo3 | =4.1 | |
Typo3 Typo3 | =4.2 | |
Typo3 Typo3 | =4.1.6 | |
Typo3 Typo3 | =4.0.5 | |
Typo3 Typo3 | =4.0.3 | |
Typo3 Typo3 | =4.1.4 | |
Typo3 Typo3 | =4.0.4 | |
Typo3 Typo3 | =4.0.1 | |
Typo3 Typo3 | =4.0.2 | |
Typo3 Typo3 | =4.0.7 | |
Typo3 Typo3 | =4.0 | |
Typo3 Typo3 | =4.0.8 | |
Typo3 Typo3 | =4.1.3 | |
Apache Apache Webserver | ||
Typo3 Typo3 | =4.0.6 | |
Typo3 Typo3 | =4.1.5 | |
Typo3 Typo3 | =4.1.2 | |
composer/typo3/cms-core | >=4.2.0<4.2.1 | 4.2.1 |
composer/typo3/cms-core | >=4.1.0<4.1.7 | 4.1.7 |
composer/typo3/cms-core | >=4.0.0<4.0.9 | 4.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.