First published: Fri Mar 19 2010(Updated: )
SQL injection vulnerability in the SAV Filter Alphabetic (sav_filter_abc) extension before 1.0.9 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
laurent foulloy SAV Filter abc | <=1.0.8 | |
laurent foulloy SAV Filter abc | =1.0.0 | |
laurent foulloy SAV Filter abc | =1.0.1 | |
laurent foulloy SAV Filter abc | =1.0.2 | |
laurent foulloy SAV Filter abc | =1.0.3 | |
laurent foulloy SAV Filter abc | =1.0.4 | |
laurent foulloy SAV Filter abc | =1.0.5 | |
laurent foulloy SAV Filter abc | =1.0.6 | |
laurent foulloy SAV Filter abc | =1.0.7 | |
TYPO3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1015 is considered to have a high severity due to its potential for SQL injection attacks.
To fix CVE-2010-1015, you should upgrade the SAV Filter Alphabetic extension to version 1.0.9 or later.
Versions of SAV Filter Alphabetic prior to 1.0.9, including 1.0.0 to 1.0.8, are affected by CVE-2010-1015.
Yes, CVE-2010-1015 allows remote attackers to execute arbitrary SQL commands, which can lead to data exposure or modification.
No, TYPO3 itself is not vulnerable to CVE-2010-1015, but the SAV Filter Alphabetic extension used within TYPO3 is.