UBUNTU-CVE-2012-1607

Source
https://ubuntu.com/security/CVE-2012-1607
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-1607.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2012-1607
Upstream
  • CVE-2012-1607
Withdrawn
2025-07-18T16:42:45Z
Published
2012-09-04T20:55:00Z
Modified
2025-07-16T07:30:53.618610Z
Severity
  • Ubuntu - negligible
Summary
[none]
Details

The Command Line Interface (CLI) script in TYPO3 4.4.0 through 4.4.13, 4.5.0 through 4.5.13, 4.6.0 through 4.6.6, 4.7, and 6.0 allows remote attackers to obtain the database name via a direct request.

References

Affected packages

Ubuntu:14.04:LTS / typo3-src

Package

Name
typo3-src
Purl
pkg:deb/ubuntu/typo3-src@4.5.32+dfsg1-1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.32+dfsg1-1

Affected versions

4.*
4.5.27+dfsg1-3
4.5.30+dfsg1-2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "typo3",
            "binary_version": "4.5.32+dfsg1-1"
        },
        {
            "binary_name": "typo3-database",
            "binary_version": "4.5.32+dfsg1-1"
        },
        {
            "binary_name": "typo3-dummy",
            "binary_version": "4.5.32+dfsg1-1"
        },
        {
            "binary_name": "typo3-src-4.5",
            "binary_version": "4.5.32+dfsg1-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-1607.json"