Vulnerability Name:

CVE-2009-0815 (CCN-48649)

Assigned:2009-02-10
Published:2009-02-10
Updated:2010-04-27
Summary:The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.1 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2009-0815

Source: CCN
Type: SA33829
Typo3 Cross-Site Scripting and Information Disclosure

Source: CCN
Type: SECTRACK ID: 1021710
TYPO3 jumpUrl Mechanism Lets Remote Users View Arbitrary Files

Source: CCN
Type: TYPO3-SA-2009-002
Information Disclosure & XSS in TYPO3 Core

Source: CONFIRM
Type: Patch, Vendor Advisory
http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/

Source: DEBIAN
Type: Patch
DSA-1720

Source: DEBIAN
Type: DSA-1720
typo3-src -- several vulnerabilities

Source: MLIST
Type: UNKNOWN
[oss-security] 20090210 CVE request: typo3 xss (typo3-sa-2009-002)

Source: CCN
Type: OSVDB ID: 52048
TYPO3 class.tslib_fe.php 3 jump_url Function Arbitrary File Access

Source: CCN
Type: BID-33714
TYPO3 Cross Site Scripting and Information Disclosure Vulnerabilities

Source: SECTRACK
Type: UNKNOWN
1021710

Source: XF
Type: UNKNOWN
typo3-jumpurl-info-disclosure(48649)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:typo3:typo3:3.3.x:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:3.5.x:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:3.6.x:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:3.7.x:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:3.8.x:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.3:alpha1:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:typo3:typo3:3.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1:beta:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.0.10:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    typo3 typo3 3.3.x
    typo3 typo3 3.5.x
    typo3 typo3 3.6.x
    typo3 typo3 3.7.x
    typo3 typo3 3.8.x
    typo3 typo3 4.0
    typo3 typo3 4.1
    typo3 typo3 4.1.0
    typo3 typo3 4.1.2
    typo3 typo3 4.1.3
    typo3 typo3 4.1.4
    typo3 typo3 4.1.5
    typo3 typo3 4.1.6
    typo3 typo3 4.1.7
    typo3 typo3 4.1.8
    typo3 typo3 4.1.9
    typo3 typo3 4.2
    typo3 typo3 4.2.0
    typo3 typo3 4.2.1
    typo3 typo3 4.2.2
    typo3 typo3 4.2.3
    typo3 typo3 4.2.4
    typo3 typo3 4.2.5
    typo3 typo3 4.3 alpha1
    typo3 typo3 3.8.0
    typo3 typo3 4.0
    typo3 typo3 4.2.0
    typo3 typo3 4.0.1
    typo3 typo3 4.0.2
    typo3 typo3 4.0.3
    typo3 typo3 4.0.4
    typo3 typo3 4.0.5
    typo3 typo3 4.0.8
    typo3 typo3 4.1.4
    typo3 typo3 4.1.6
    typo3 typo3 4.2.1
    typo3 typo3 4.2.2
    typo3 typo3 4.2.3
    typo3 typo3 4.1 rc1
    typo3 typo3 4.1 beta
    typo3 typo3 4.1.7
    typo3 typo3 4.0.9
    typo3 typo3 4.2.4
    typo3 typo3 4.0.10
    debian debian linux 4.0
    typo3 typo3 4.1