GHSA-w736-qv86-vq94

Suggest an improvement
Source
https://github.com/advisories/GHSA-w736-qv86-vq94
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w736-qv86-vq94/GHSA-w736-qv86-vq94.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-w736-qv86-vq94
Aliases
  • CVE-2010-3714
Published
2022-05-17T05:28:57Z
Modified
2024-02-08T00:26:46.556662Z
Summary
TYPO3 Remote File Disclosure vulnerability in the jumpUrl mechanism
Details

The jumpUrl (aka access tracking) implementation in tslib/class.tslib_fe.php in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly compare certain hash values during access-control decisions, which allows remote attackers to read arbitrary files via unspecified vectors.

Database specific
{
    "nvd_published_at": "2010-10-25T20:01:00Z",
    "cwe_ids": [
        "CWE-284"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-07T23:57:37Z"
}
References

Affected packages

Packagist / typo3/cms

Package

Name
typo3/cms
Purl
pkg:composer/typo3/cms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.2.0
Fixed
4.2.15

Packagist / typo3/cms

Package

Name
typo3/cms
Purl
pkg:composer/typo3/cms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.3.0
Fixed
4.3.7

Packagist / typo3/cms

Package

Name
typo3/cms
Purl
pkg:composer/typo3/cms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.4.0
Fixed
4.4.4