Vulnerability Name:

CVE-2013-7073 (CCN-89619)

Assigned:2013-12-10
Published:2013-12-10
Updated:2016-11-28
Summary:The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 does not check permissions, which allows remote authenticated editors to read arbitrary TYPO3 table columns via unspecified parameters.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
1.9 Low (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N)
1.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2013-7073

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2016:2025

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2016:2114

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2016:2169

Source: MLIST
Type: UNKNOWN
[oss-security] 20131211 CVE request: TYPO3-CORE-SA-2013-004 and TYPO3-FLOW-SA-2013-001

Source: MLIST
Type: UNKNOWN
[oss-security] 20131212 Re: CVE request: TYPO3-CORE-SA-2013-004 and TYPO3-FLOW-SA-2013-001

Source: CCN
Type: SA55958
TYPO3 Multiple Vulnerabilities

Source: CCN
Type: TYPO3 Web site
TYPO3 - The Enterprise Open Source CMS - TYPO3 - The Enterprise Open Source CMS

Source: CCN
Type: TYPO3-CORE-SA-2013-004
Multiple Vulnerabilities in TYPO3 CMS

Source: CONFIRM
Type: Vendor Advisory
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/

Source: DEBIAN
Type: UNKNOWN
DSA-2834

Source: CCN
Type: BID-64240
TYPO3 Content Editing Wizards Information Disclosure Vulnerability

Source: XF
Type: UNKNOWN
contenteditingwizards-url-info-disc(89619)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:typo3:typo3:4.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.8:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.9:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.10:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.11:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.12:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.13:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.14:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.15:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.16:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.17:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.18:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.19:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.20:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.21:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.22:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.23:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.24:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.25:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.26:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.27:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.28:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.29:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.30:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.5.31:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:typo3:typo3:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.1.6:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:typo3:typo3:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:6.0.11:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:typo3:typo3:4.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.2:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.4:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.5:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.6:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.7:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.8:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.9:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.10:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.11:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.12:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.13:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.14:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.15:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:4.7.16:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20137073
    V
    CVE-2013-7073
    2018-05-02
    oval:org.mitre.oval:def:21057
    P
    DSA-2834-1 typo3-src - several
    2014-06-23
    oval:com.ubuntu.precise:def:20137073000
    V
    CVE-2013-7073 on Ubuntu 12.04 LTS (precise) - medium.
    2013-12-23
    oval:com.ubuntu.trusty:def:20137073000
    V
    CVE-2013-7073 on Ubuntu 14.04 LTS (trusty) - medium.
    2013-12-23
    BACK
    typo3 typo3 4.5.0
    typo3 typo3 4.5.1
    typo3 typo3 4.5.2
    typo3 typo3 4.5.3
    typo3 typo3 4.5.4
    typo3 typo3 4.5.5
    typo3 typo3 4.5.6
    typo3 typo3 4.5.7
    typo3 typo3 4.5.8
    typo3 typo3 4.5.9
    typo3 typo3 4.5.10
    typo3 typo3 4.5.11
    typo3 typo3 4.5.12
    typo3 typo3 4.5.13
    typo3 typo3 4.5.14
    typo3 typo3 4.5.15
    typo3 typo3 4.5.16
    typo3 typo3 4.5.17
    typo3 typo3 4.5.18
    typo3 typo3 4.5.19
    typo3 typo3 4.5.20
    typo3 typo3 4.5.21
    typo3 typo3 4.5.22
    typo3 typo3 4.5.23
    typo3 typo3 4.5.24
    typo3 typo3 4.5.25
    typo3 typo3 4.5.26
    typo3 typo3 4.5.27
    typo3 typo3 4.5.28
    typo3 typo3 4.5.29
    typo3 typo3 4.5.30
    typo3 typo3 4.5.31
    typo3 typo3 6.1
    typo3 typo3 6.1.1
    typo3 typo3 6.1.2
    typo3 typo3 6.1.3
    typo3 typo3 6.1.4
    typo3 typo3 6.1.5
    typo3 typo3 6.1.6
    typo3 typo3 6.0
    typo3 typo3 6.0.1
    typo3 typo3 6.0.2
    typo3 typo3 6.0.3
    typo3 typo3 6.0.4
    typo3 typo3 6.0.5
    typo3 typo3 6.0.6
    typo3 typo3 6.0.7
    typo3 typo3 6.0.8
    typo3 typo3 6.0.9
    typo3 typo3 6.0.10
    typo3 typo3 6.0.11
    typo3 typo3 4.7.0
    typo3 typo3 4.7.1
    typo3 typo3 4.7.2
    typo3 typo3 4.7.3
    typo3 typo3 4.7.4
    typo3 typo3 4.7.5
    typo3 typo3 4.7.6
    typo3 typo3 4.7.7
    typo3 typo3 4.7.8
    typo3 typo3 4.7.9
    typo3 typo3 4.7.10
    typo3 typo3 4.7.11
    typo3 typo3 4.7.12
    typo3 typo3 4.7.13
    typo3 typo3 4.7.14
    typo3 typo3 4.7.15
    typo3 typo3 4.7.16