CVE-2012-3527

view_help.php in the backend help system in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote authenticated backend users to unserialize arbitrary objects and possibly execute arbitrary PHP code via an unspecified parameter, related to a "missing signature (HMAC)."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

History

21 Jan 2024, 02:47

Type Values Removed Values Added
CWE CWE-310 CWE-502
CPE cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.7:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
References (SECUNIA) http://secunia.com/advisories/50287 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/50287 - Not Applicable
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/77791 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/77791 - Third Party Advisory, VDB Entry
References (DEBIAN) http://www.debian.org/security/2012/dsa-2537 - (DEBIAN) http://www.debian.org/security/2012/dsa-2537 - Third Party Advisory
References (OSVDB) http://osvdb.org/84773 - (OSVDB) http://osvdb.org/84773 - Broken Link
References (MLIST) http://www.openwall.com/lists/oss-security/2012/08/22/8 - (MLIST) http://www.openwall.com/lists/oss-security/2012/08/22/8 - Mailing List

Information

Published : 2012-09-05 23:55

Updated : 2024-02-04 18:16


NVD link : CVE-2012-3527

Mitre link : CVE-2012-3527

CVE.ORG link : CVE-2012-3527


JSON object : View

Products Affected

typo3

  • typo3

debian

  • debian_linux
CWE
CWE-502

Deserialization of Untrusted Data