** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This vulnerability affects the function moduleContent of the file mod1/index.php. The manipulation leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The name of the patch is 429f50f4e4795b20dae06735b41fb94f010722bf. It is recommended to upgrade the affected component. VDB-230086 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://github.com/mback2k/mh_httpbl/commit/429f50f4e4795b20dae06735b41fb94f010722bf | Patch |
https://github.com/mback2k/mh_httpbl/releases/tag/mh_httpbl_1.1.8_security | Release Notes |
https://typo3.org/article/typo3-ext-sa-2015-021 | Third Party Advisory |
https://vuldb.com/?ctiid.230086 | Permissions Required |
https://vuldb.com/?id.230086 | Permissions Required |
Configurations
History
02 Jun 2023, 19:50
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (MISC) https://vuldb.com/?ctiid.230086 - Permissions Required | |
References | (MISC) https://github.com/mback2k/mh_httpbl/releases/tag/mh_httpbl_1.1.8_security - Release Notes | |
References | (MISC) https://typo3.org/article/typo3-ext-sa-2015-021 - Third Party Advisory | |
References | (MISC) https://github.com/mback2k/mh_httpbl/commit/429f50f4e4795b20dae06735b41fb94f010722bf - Patch | |
References | (MISC) https://vuldb.com/?id.230086 - Permissions Required | |
CPE | cpe:2.3:a:mh_httpbl_project:mh_httpbl:*:*:*:*:*:typo3:*:* |
31 May 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This vulnerability affects the function moduleContent of the file mod1/index.php. The manipulation leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The name of the patch is 429f50f4e4795b20dae06735b41fb94f010722bf. It is recommended to upgrade the affected component. VDB-230086 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
28 May 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-28 13:15
Updated : 2024-08-06 09:15
NVD link : CVE-2015-10106
Mitre link : CVE-2015-10106
CVE.ORG link : CVE-2015-10106
JSON object : View
Products Affected
mh_httpbl_project
- mh_httpbl
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')