Package: typo3-src      
Version: 4.0.2+debian-7
Severity: critical
Tags: security

TYPO3 Security Bulletin TYPO3-SA-2009-002:
Information Disclosure & XSS in TYPO3 Core

Problem Description 1: An Information Disclosure vulnerability in jumpUrl 
mechanism, used to track access on web pages and provided files, allows a 
remote attacker to read arbitrary files on a host.

The expected value of a mandatory hash secret, intended to invalidate such 
requests, is exposed to remote users allowing them to bypass access control by 
providing the correct value.

There's no authentication required to exploit this vulnerability. The 
vulnerability allows to read any file, the web server user account has access 
to. 

Problem Description 2: Failing to sanitize user input, three fields in the 
backend is open to Cross-Site Scripting (XSS). 


-- 
 MfG, Christian Welzel

  GPG-Key:     http://www.camlann.de/key.asc
  Fingerprint: 4F50 19BF 3346 36A6 CFA9 DBDC C268 6D24 70A1 AD15



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to