First published: Tue May 20 2014(Updated: )
The (1) file upload component and (2) File Abstraction Layer (FAL) in TYPO3 6.0.x before 6.0.8 and 6.1.x before 6.1.3 do not properly check file extensions, which allow remote authenticated editors to execute arbitrary PHP code by uploading a .php file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
TYPO3 | =6.0 | |
TYPO3 | =6.0.1 | |
TYPO3 | =6.0.2 | |
TYPO3 | =6.0.3 | |
TYPO3 | =6.0.4 | |
TYPO3 | =6.0.5 | |
TYPO3 | =6.0.6 | |
TYPO3 | =6.0.7 | |
TYPO3 | =6.0.9 | |
TYPO3 | =6.1 | |
TYPO3 | =6.1.1 | |
TYPO3 | =6.1.2 | |
composer/typo3/cms | >=6.1.0<6.1.3 | 6.1.3 |
composer/typo3/cms | >=6.0.0<6.0.8 | 6.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4250 has a high severity rating due to its potential for remote code execution.
To fix CVE-2013-4250, upgrade to TYPO3 versions 6.0.8 or 6.1.3 or later.
CVE-2013-4250 affects TYPO3 versions 6.0.x before 6.0.8 and 6.1.x before 6.1.3.
CVE-2013-4250 is a file upload vulnerability that allows execution of arbitrary PHP code.
No, CVE-2013-4250 requires remote authenticated editors to exploit the vulnerability.