First published: Thu Jan 22 2009(Updated: )
The Indexed Search Engine (indexed_search) system extension in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 allows remote attackers to execute arbitrary commands via a crafted filename containing shell metacharacters, which is not properly handled by the command-line indexer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=4.2.0<=4.2.3 | 4.2.4 |
composer/typo3/cms | >=4.1.0<=4.1.7 | 4.1.8 |
composer/typo3/cms | >=4.0.0<=4.0.9 | 4.0.10 |
TYPO3 | =4.0 | |
TYPO3 | =4.0.1 | |
TYPO3 | =4.0.2 | |
TYPO3 | =4.0.3 | |
TYPO3 | =4.0.4 | |
TYPO3 | =4.0.5 | |
TYPO3 | =4.0.6 | |
TYPO3 | =4.0.7 | |
TYPO3 | =4.0.8 | |
TYPO3 | =4.0.9 | |
TYPO3 | =4.1.0 | |
TYPO3 | =4.1.0-beta1 | |
TYPO3 | =4.1.0-rc1 | |
TYPO3 | =4.1.1 | |
TYPO3 | =4.1.2 | |
TYPO3 | =4.1.3 | |
TYPO3 | =4.1.4 | |
TYPO3 | =4.1.5 | |
TYPO3 | =4.1.6 | |
TYPO3 | =4.1.7 | |
TYPO3 | =4.2.0 | |
TYPO3 | =4.2.1 | |
TYPO3 | =4.2.2 | |
TYPO3 | =4.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0258 has a high severity rating due to its potential to allow remote command execution.
To fix CVE-2009-0258, upgrade TYPO3 to version 4.2.4, 4.1.8, or 4.0.10, depending on your current version.
CVE-2009-0258 affects TYPO3 versions 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3.
Yes, CVE-2009-0258 can be exploited by remote attackers without requiring authentication.
CVE-2009-0258 allows unauthorized remote execution of arbitrary commands via crafted filenames.