Hi,
Reply-To: Salvatore Bonaccorso <[email protected]>, [email protected]
Resent-From: Salvatore Bonaccorso <[email protected]>
Resent-To: [email protected]
Resent-CC: [email protected], [email protected], 
[email protected], Christian Welzel 
<[email protected]>
X-Loop: [email protected]
Resent-Date: Sun, 11 Jan 2015 14:12:01 +0000
Resent-Message-ID: <[email protected]>
Resent-Sender: [email protected]
X-Debian-PR-Message: report 775105
X-Debian-PR-Package: src:typo3-src
X-Debian-PR-Keywords: fixed-upstream security upstream
X-Debian-PR-Source: typo3-src
Received: via spool by [email protected] id=B.142098536414427
          (code B); Sun, 11 Jan 2015 14:12:01 +0000
Received: (at submit) by bugs.debian.org; 11 Jan 2015 14:09:24 +0000
X-Spam-Checker-Version: SpamAssassin 3.3.2-bugs.debian.org_2005_01_02
        (2011-06-06) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-1.0 required=4.0 tests=BAYES_00,DIGITS_LETTERS,
        DNS_FROM_AHBL_RHSBL,FROMDEVELOPER,PUSSY,RCVD_IN_PBL,RCVD_IN_SORBS_DUL,
        RDNS_DYNAMIC,T_RCVD_IN_SEMBLACK,XMAILER_REPORTBUG,X_DEBBUGS_CC 
autolearn=no
        version=3.3.2-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 24; hammy, 145; neutral, 41; spammy,
        3. spammytokens:0.987-1--H*MI:33208, 0.987-1--H*M:33208,
        0.957-+--H*r:bugs.debian.org hammytokens:0.000-+--H*F:U*carnil,
        0.000-+--H*M:reportbug, 0.000-+--H*MI:reportbug, 0.000-+--H*x:reportbug,
        0.000-+--gitweb
Received: from 84-75-170-174.dclient.hispeed.ch ([84.75.170.174] 
helo=eldamar.local)
        by buxtehude.debian.org with esmtp (Exim 4.80)
        (envelope-from <[email protected]>)
        id 1YAJCm-0003k8-0h
        for [email protected]; Sun, 11 Jan 2015 14:09:24 +0000
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Salvatore Bonaccorso <[email protected]>
To: Debian Bug Tracking System <[email protected]>
Message-ID: <[email protected]>
X-Mailer: reportbug 6.6.3
Date: Sun, 11 Jan 2015 15:09:19 +0100
Delivered-To: [email protected]

Source: typo3-src
Version: 4.5.35+dfsg1-1
Severity: important
Tags: security upstream fixed-upstream
Control: found -1 4.5.19+dfsg1-5+wheezy3

the following vulnerability was published for typo3-src.

CVE-2014-9508[0]:
| The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x
| through 6.2.x before 6.2.9, and 7.x before 7.0.2, when
| config.prefixLocalAnchors is set and using a homepage with links that
| only contain anchors, allows remote attackers to change URLs to
| arbitrary domains for those links via unknown vectors.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2014-9508
[1] https://review.typo3.org/#/c/35222/
[2] 
https://review.typo3.org/gitweb?p=Packages/TYPO3.CMS.git;a=commitdiff;h=63ae7ddd11d284a121f23ce86282e3149bc16f96

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to