view_help.php in the backend help system in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote authenticated backend users to unserialize arbitrary objects and possibly execute arbitrary PHP code via an unspecified parameter, related to a "missing signature (HMAC)."
References
Link | Resource |
---|---|
http://osvdb.org/84773 | Broken Link |
http://secunia.com/advisories/50287 | Not Applicable |
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/ | Vendor Advisory |
http://www.debian.org/security/2012/dsa-2537 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/08/22/8 | Mailing List |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77791 | Third Party Advisory VDB Entry |
http://osvdb.org/84773 | Broken Link |
http://secunia.com/advisories/50287 | Not Applicable |
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/ | Vendor Advisory |
http://www.debian.org/security/2012/dsa-2537 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/08/22/8 | Mailing List |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77791 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 01:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/84773 - Broken Link | |
References | () http://secunia.com/advisories/50287 - Not Applicable | |
References | () http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/ - Vendor Advisory | |
References | () http://www.debian.org/security/2012/dsa-2537 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2012/08/22/8 - Mailing List | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/77791 - Third Party Advisory, VDB Entry |
21 Jan 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.7:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:* |
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* |
References | (SECUNIA) http://secunia.com/advisories/50287 - Not Applicable | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/77791 - Third Party Advisory, VDB Entry | |
References | (DEBIAN) http://www.debian.org/security/2012/dsa-2537 - Third Party Advisory | |
References | (OSVDB) http://osvdb.org/84773 - Broken Link | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2012/08/22/8 - Mailing List | |
CWE | CWE-502 |
Information
Published : 2012-09-05 23:55
Updated : 2024-11-21 01:41
NVD link : CVE-2012-3527
Mitre link : CVE-2012-3527
CVE.ORG link : CVE-2012-3527
JSON object : View
Products Affected
debian
- debian_linux
typo3
- typo3
CWE
CWE-502
Deserialization of Untrusted Data