| Vulnerability Name: | CCN-91528 | ||||||
| Published: | 2014-02-24 | ||||||
| Updated: | 2014-02-24 | ||||||
| Summary: | TYPO3 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the mod.php script. A remote authenticated attacker could exploit this vulnerability using the tx_scheduler[class] parameter in a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. | ||||||
| CVSS v3 Severity: | 2.6 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N)
| ||||||
| CVSS v2 Severity: | 3.5 Low (CCN CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N) 3.3 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N/E:H/RL:U/RC:UR)
| ||||||
| Vulnerability Consequences: | Cross-Site Scripting | ||||||
| References: | Source: CCN Type: TYPO3 Web site TYPO3 Source: XF Type: UNKNOWN typo3-mod-xss(91528) Source: CCN Type: Packet Storm Security [02-25-2014] TYPO3 6.1.7 XSS / Disclosure / Shell Upload | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||