First published: Wed Sep 05 2012(Updated: )
view_help.php in the backend help system in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote authenticated backend users to unserialize arbitrary objects and possibly execute arbitrary PHP code via an unspecified parameter, related to a "missing signature (HMAC)."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
TYPO3 | =4.5 | |
TYPO3 | =4.5.0 | |
TYPO3 | =4.5.1 | |
TYPO3 | =4.5.2 | |
TYPO3 | =4.5.3 | |
TYPO3 | =4.5.4 | |
TYPO3 | =4.5.5 | |
TYPO3 | =4.5.6 | |
TYPO3 | =4.5.7 | |
TYPO3 | =4.5.8 | |
TYPO3 | =4.5.9 | |
TYPO3 | =4.5.10 | |
TYPO3 | =4.5.11 | |
TYPO3 | =4.5.12 | |
TYPO3 | =4.5.13 | |
TYPO3 | =4.5.14 | |
TYPO3 | =4.5.15 | |
TYPO3 | =4.5.16 | |
TYPO3 | =4.5.17 | |
TYPO3 | =4.5.18 | |
TYPO3 | =4.6 | |
TYPO3 | =4.6.0 | |
TYPO3 | =4.6.1 | |
TYPO3 | =4.6.2 | |
TYPO3 | =4.6.3 | |
TYPO3 | =4.6.4 | |
TYPO3 | =4.6.5 | |
TYPO3 | =4.6.6 | |
TYPO3 | =4.6.7 | |
TYPO3 | =4.6.8 | |
TYPO3 | =4.6.9 | |
TYPO3 | =4.6.10 | |
TYPO3 | =4.6.11 | |
TYPO3 | =4.7 | |
TYPO3 | =4.7.0 | |
TYPO3 | =4.7.1 | |
TYPO3 | =4.7.2 | |
TYPO3 | =4.7.3 | |
TYPO3 | >=4.5.0<4.5.19 | |
TYPO3 | >=4.6.0<4.6.12 | |
TYPO3 | >=4.7.0<4.7.4 | |
Debian Linux | =6.0 | |
Debian Linux | =7.0 | |
composer/typo3/cms | >=4.7.0<4.7.4 | 4.7.4 |
composer/typo3/cms | >=4.6.0<4.6.12 | 4.6.12 |
composer/typo3/cms | >=4.5.0<4.5.19 | 4.5.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3527 is classified as a high severity vulnerability due to its potential to allow remote authenticated users to execute arbitrary PHP code.
To fix CVE-2012-3527, you should upgrade TYPO3 to a version later than 4.5.19, 4.6.12, or 4.7.4.
CVE-2012-3527 affects TYPO3 versions 4.5.0 to 4.5.18, 4.6.0 up to 4.6.11, and 4.7.0 to 4.7.3.
No, CVE-2012-3527 requires remote authenticated backend users to exploit the vulnerability.
CVE-2012-3527 is an unserialization vulnerability that may lead to remote code execution.