First published: Thu Mar 05 2009(Updated: )
The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Typo3 Typo3 | =4.3-alpha1 | |
Typo3 Typo3 | =3.5.x | |
Typo3 Typo3 | =4.2.4 | |
Typo3 Typo3 | =4.1 | |
Typo3 Typo3 | =4.2 | |
Typo3 Typo3 | =4.2.5 | |
Typo3 Typo3 | =4.1.8 | |
Typo3 Typo3 | =4.1.6 | |
Typo3 Typo3 | =4.2.0 | |
Typo3 Typo3 | =4.2.3 | |
Typo3 Typo3 | =4.1.4 | |
Typo3 Typo3 | =3.7.x | |
Typo3 Typo3 | =4.2.1 | |
Typo3 Typo3 | =4.1.7 | |
Typo3 Typo3 | =4.1.0 | |
Typo3 Typo3 | =4.0 | |
Typo3 Typo3 | =4.1.9 | |
Typo3 Typo3 | =4.2.2 | |
Typo3 Typo3 | =3.8.x | |
Typo3 Typo3 | =3.6.x | |
Typo3 Typo3 | =3.3.x | |
Typo3 Typo3 | =4.1.3 | |
Typo3 Typo3 | =4.1.5 | |
Typo3 Typo3 | =4.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.