First published: Mon Nov 02 2009(Updated: )
The Install Tool subcomponent in TYPO3 4.0.13 and earlier, 4.1.x before 4.1.13, 4.2.x before 4.2.10, and 4.3.x before 4.3beta2 allows remote attackers to gain access by using only the password's md5 hash as a credential.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
TYPO3 | <=4.0.12 | |
TYPO3 | =0.1.2 | |
TYPO3 | =1.0.14 | |
TYPO3 | =1.1 | |
TYPO3 | =1.1.1 | |
TYPO3 | =1.1.09 | |
TYPO3 | =1.1.10 | |
TYPO3 | =1.2.0 | |
TYPO3 | =1.3.0 | |
TYPO3 | =1.3.2 | |
TYPO3 | =3.0 | |
TYPO3 | =3.3.x | |
TYPO3 | =3.5 | |
TYPO3 | =3.5.x | |
TYPO3 | =3.6.x | |
TYPO3 | =3.7.0 | |
TYPO3 | =3.7.1 | |
TYPO3 | =3.7.x | |
TYPO3 | =3.8 | |
TYPO3 | =3.8.x | |
TYPO3 | =4.0 | |
TYPO3 | =4.0.1 | |
TYPO3 | =4.0.2 | |
TYPO3 | =4.0.3 | |
TYPO3 | =4.0.4 | |
TYPO3 | =4.0.5 | |
TYPO3 | =4.0.6 | |
TYPO3 | =4.0.7 | |
TYPO3 | =4.0.8 | |
TYPO3 | =4.0.9 | |
TYPO3 | =4.0.10 | |
TYPO3 | =4.0.11 | |
TYPO3 | =4.1.0 | |
TYPO3 | =4.1.0-beta1 | |
TYPO3 | =4.1.0-rc1 | |
TYPO3 | =4.1.1 | |
TYPO3 | =4.1.2 | |
TYPO3 | =4.1.3 | |
TYPO3 | =4.1.4 | |
TYPO3 | =4.1.5 | |
TYPO3 | =4.1.6 | |
TYPO3 | =4.1.7 | |
TYPO3 | =4.1.8 | |
TYPO3 | =4.1.9 | |
TYPO3 | =4.1.10 | |
TYPO3 | =4.1.11 | |
TYPO3 | =4.1.12 | |
TYPO3 | =4.2.0 | |
TYPO3 | =4.2.1 | |
TYPO3 | =4.2.2 | |
TYPO3 | =4.2.3 | |
TYPO3 | =4.2.4 | |
TYPO3 | =4.2.5 | |
TYPO3 | =4.2.6 | |
TYPO3 | =4.2.7 | |
TYPO3 | =4.2.8 | |
TYPO3 | =4.2.9 | |
TYPO3 | =4.3 | |
TYPO3 | =4.3-alpha1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3635 is considered a high severity vulnerability due to the potential for unauthorized remote access using only an MD5 hash.
To fix CVE-2009-3635, upgrade to TYPO3 version 4.1.13, 4.2.10, or 4.3beta2 or later versions.
CVE-2009-3635 affects TYPO3 versions 4.0.13 and earlier, all versions of 4.1.x before 4.1.13, 4.2.x before 4.2.10, and 4.3.x before 4.3beta2.
CVE-2009-3635 exploits a flaw in the Install Tool subcomponent that allows attackers to authenticate using only the MD5 hash of a password.
While upgrading is the recommended fix for CVE-2009-3635, disabling remote access to the Install Tool can serve as a temporary workaround.