First published: Tue Dec 10 2013(Updated: )
Cross-site scripting (XSS) vulnerability in the errorAction method in the ActionController base class in TYPO3 Flow (formerly FLOW3) 1.1.x before 1.1.1 and 2.0.x before 2.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified input, which is returned in an error message.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/neos/flow | >=1.1.0<1.1.1>=2.0.0<2.0.1 | |
composer/typo3/flow | >=1.1.0<1.1.1>=2.0.0<2.0.1 | |
TYPO3 Flow | =1.1.0 | |
TYPO3 Flow | =2.0.0 | |
composer/typo3/flow | >=2.0.0<2.0.1 | 2.0.1 |
composer/typo3/flow | >=1.1.0<1.1.1 | 1.1.1 |
composer/neos/flow | >=2.0.0<2.0.1 | 2.0.1 |
composer/neos/flow | >=1.1.0<1.1.1 | 1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7082 is classified as a medium severity cross-site scripting (XSS) vulnerability.
To fix CVE-2013-7082, upgrade TYPO3 Flow to version 1.1.1 or 2.0.1 or later.
Affected versions of TYPO3 Flow are 1.1.0 to 1.1.1 and 2.0.0 to 2.0.1.
CVE-2013-7082 is a cross-site scripting (XSS) vulnerability that allows injection of arbitrary web script or HTML.
Yes, remote attackers can exploit CVE-2013-7082 to inject malicious web scripts into error messages.