First published: Fri Feb 27 2009(Updated: )
SQL injection vulnerability in the TU-Clausthal Staff (tuc_staff) 0.3.0 and earlier extension for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TYPO3 | ||
TYPO3 TU-Clausthal Staff | <=0.3.0 | |
TYPO3 TU-Clausthal Staff | =0.0.1 | |
TYPO3 TU-Clausthal Staff | =0.1.0 | |
TYPO3 TU-Clausthal Staff | =0.1.1 | |
TYPO3 TU-Clausthal Staff | =0.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6344 has a moderate severity level, allowing remote attackers to execute arbitrary SQL commands.
To fix CVE-2008-6344, you should upgrade the TU-Clausthal Staff extension to version 0.3.1 or later.
CVE-2008-6344 affects the TU-Clausthal Staff extension for TYPO3 versions 0.3.0 and earlier.
CVE-2008-6344 allows SQL injection attacks, enabling execution of arbitrary SQL commands.
CVE-2008-6344 was reported due to inadequate input validation which allowed SQL commands to be injected.