Package: typo3-src
Severity: critical
Tags: security

Component Type: TYPO3 Core

Affected Versions: 4.5.0 up to 4.5.8, 4.6.0 and 4.6.1
Vulnerability Types: Remote Code Execution
Overall Severity: Critical


Vulnerable subcomponent: TYPO3 workspaces
Vulnerability Type: Remote Code Execution
Severity: Critical
Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
Problem Description: A PHP file which is part of the workspaces system
extension does not validate passed arguments.

You are only vulnerable if all of the following conditions are met:

   1. You are using TYPO3 version 4.5.0 up to 4.5.8,  4.6.0 or 4.6.1.
   2. You have all of following PHP configuration variables set to "on":
register_globals ("off" by default, advised to be "off" in TYPO3
Security Guide), allow_url_include ("off" by default) and
allow_url_fopen ("on" by default)

If you are using the Suhosin PHP extension you are only vulnerable if
you have additionally put URL schemes in the configuration variable
"suhosin.executor.include.whitelist".

The workspaces system extension does not need to be activated for this
vulnerability to exist.

Possible Impact: A crafted request to a vulnerable TYPO3 installation
will allow an attacker to load PHP code from an external source and to
execute it on the TYPO3 installation.


-- 
 MfG, Christian Welzel

  GPG-Key:     http://www.camlann.de/de/pgpkey.html
  Fingerprint: 4F50 19BF 3346 36A6 CFA9 DBDC C268 6D24 70A1 AD15



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to