cve-2010-5099
Vulnerability from cvelistv5
Published
2012-05-30 20:00
Modified
2024-08-07 04:09
Severity ?
Summary
The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly filter file types, which allows remote attackers to bypass intended access restrictions and access arbitrary PHP files, as demonstrated using path traversal sequences with %00 null bytes and CVE-2010-3714 to read the TYPO3 encryption key from localconf.php.
References
secalert@redhat.comhttp://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.htmlExploit
secalert@redhat.comhttp://secunia.com/advisories/35770Vendor Advisory
secalert@redhat.comhttp://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/Vendor Advisory
secalert@redhat.comhttp://www.exploit-db.com/exploits/15856Exploit
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/01/13/2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/10/7
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/11/3
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/12/5
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/64180
af854a3a-2127-422b-91ae-364da2661108http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35770Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/15856Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/01/13/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/10/7
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/11/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/12/5
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64180
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:09:38.999Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/"
          },
          {
            "name": "typo3-unspecified-file-include(64180)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64180"
          },
          {
            "name": "35770",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35770"
          },
          {
            "name": "[oss-security] 20120512 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without  CVE",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/12/5"
          },
          {
            "name": "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/01/13/2"
          },
          {
            "name": "15856",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/15856"
          },
          {
            "name": "[oss-security] 20120510  Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without  CVE",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/11/3"
          },
          {
            "name": "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without  CVE",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/10/7"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly filter file types, which allows remote attackers to bypass intended access restrictions and access arbitrary PHP files, as demonstrated using path traversal sequences with %00 null bytes and CVE-2010-3714 to read the TYPO3 encryption key from localconf.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/"
        },
        {
          "name": "typo3-unspecified-file-include(64180)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64180"
        },
        {
          "name": "35770",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35770"
        },
        {
          "name": "[oss-security] 20120512 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without  CVE",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/12/5"
        },
        {
          "name": "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/01/13/2"
        },
        {
          "name": "15856",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/15856"
        },
        {
          "name": "[oss-security] 20120510  Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without  CVE",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/11/3"
        },
        {
          "name": "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without  CVE",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/10/7"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2010-5099",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly filter file types, which allows remote attackers to bypass intended access restrictions and access arbitrary PHP files, as demonstrated using path traversal sequences with %00 null bytes and CVE-2010-3714 to read the TYPO3 encryption key from localconf.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/",
              "refsource": "CONFIRM",
              "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/"
            },
            {
              "name": "typo3-unspecified-file-include(64180)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64180"
            },
            {
              "name": "35770",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35770"
            },
            {
              "name": "[oss-security] 20120512 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without  CVE",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/12/5"
            },
            {
              "name": "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/01/13/2"
            },
            {
              "name": "15856",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/15856"
            },
            {
              "name": "[oss-security] 20120510  Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without  CVE",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/11/3"
            },
            {
              "name": "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without  CVE",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/10/7"
            },
            {
              "name": "http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html",
              "refsource": "MISC",
              "url": "http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-5099",
    "datePublished": "2012-05-30T20:00:00",
    "dateReserved": "2012-04-30T00:00:00",
    "dateUpdated": "2024-08-07T04:09:38.999Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D93919E9-B3E8-483E-A701-D87570127207\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6B1326B-CB9E-4B40-85BD-05AF52E6A1D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDDEAF6A-8A99-4872-98CC-12BD54515B07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D8185B9-D244-43B3-9DF1-FF137A2108DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FFAD319-DDFC-499F-86AB-141FBE435F6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E068CC16-6995-40C6-BA24-9CA334C4CABB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3B79B49-B4A1-472D-9F6E-BF9ADA3E2EC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26DF36E3-785F-4515-8999-BF48A255907F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F143436A-848B-443F-95E2-B20BC2403CDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB5B21D3-7955-450F-8357-A37905B963B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CC67810-D2C5-4242-ACF2-CF7E9C56D7FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E485652B-FDE0-44C1-83F5-D22B16BEBB34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3A987C0-51DF-464C-8F4D-03C9CAD256EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"718E405D-4127-4D0E-85BB-83800264AD61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF72642B-8766-44A3-8CB0-D094929AAA6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF56D768-6D41-472D-AA42-0C209534AB30\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6066CFA2-202E-43A3-B1DF-36364ABD5A1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13C922A9-05A3-4D98-A568-F780CCA87E39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44E9893A-2771-4C04-9F90-B10EE659088E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31DA3600-C955-46B0-8BD9-C9B3FC0B81EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7ED0C04-33BA-4F9B-97B0-BB5D30C2A0D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E40CC0D-E7EF-4800-AC0B-5AF603B8BC6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16759F16-34C6-4C2C-BECB-12555EEEBDA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBB331CC-3125-454E-BCBE-B85540B62110\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9B46AB0-D925-4E74-8D15-40EE3BC0B14A\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A60F86FA-B7D3-4BE5-82F2-05F2A5F5663D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9319A96-D510-47DB-9DBC-C16C0947E4C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40E0FDF1-E63C-48C9-98E2-55E3FD891882\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6D22400-E6A1-4C3A-B16F-E14672B86D14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:typo3:typo3:4.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DFA0996-4839-4FDB-9B9D-5F8424946F9A\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly filter file types, which allows remote attackers to bypass intended access restrictions and access arbitrary PHP files, as demonstrated using path traversal sequences with %00 null bytes and CVE-2010-3714 to read the TYPO3 encryption key from localconf.php.\"}, {\"lang\": \"es\", \"value\": \"La funcionalidad fileDenyPattern en la API de protecci\\u00f3n de inclusi\\u00f3n de archivos en TYPO3 v4.2.x antes de v4.2.16, v4.3.x antes de v4.3.9, y 4.4.x antes v4.4.5, no filtra correctamente los tipos de archivos, lo que permite a atacantes remotos evitar restricciones de acceso y acceder a archivos arbitrarios de PHP, como se ha demostrado utilizando secuencias de rutas transversales con bytes nulos 00% y CVE-2010-3714 para leer la clave de cifrado TYPO3 de localconf.php.\"}]",
      "id": "CVE-2010-5099",
      "lastModified": "2024-11-21T01:22:30.343",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2012-05-30T20:55:02.847",
      "references": "[{\"url\": \"http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://secunia.com/advisories/35770\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.exploit-db.com/exploits/15856\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2011/01/13/2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/05/10/7\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/05/11/3\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/05/12/5\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/64180\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://secunia.com/advisories/35770\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.exploit-db.com/exploits/15856\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2011/01/13/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/05/10/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/05/11/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/05/12/5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/64180\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "secalert@redhat.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2010-5099\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-05-30T20:55:02.847\",\"lastModified\":\"2024-11-21T01:22:30.343\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly filter file types, which allows remote attackers to bypass intended access restrictions and access arbitrary PHP files, as demonstrated using path traversal sequences with %00 null bytes and CVE-2010-3714 to read the TYPO3 encryption key from localconf.php.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad fileDenyPattern en la API de protecci\u00f3n de inclusi\u00f3n de archivos en TYPO3 v4.2.x antes de v4.2.16, v4.3.x antes de v4.3.9, y 4.4.x antes v4.4.5, no filtra correctamente los tipos de archivos, lo que permite a atacantes remotos evitar restricciones de acceso y acceder a archivos arbitrarios de PHP, como se ha demostrado utilizando secuencias de rutas transversales con bytes nulos 00% y CVE-2010-3714 para leer la clave de cifrado TYPO3 de localconf.php.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93919E9-B3E8-483E-A701-D87570127207\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B1326B-CB9E-4B40-85BD-05AF52E6A1D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDEAF6A-8A99-4872-98CC-12BD54515B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8185B9-D244-43B3-9DF1-FF137A2108DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFAD319-DDFC-499F-86AB-141FBE435F6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E068CC16-6995-40C6-BA24-9CA334C4CABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3B79B49-B4A1-472D-9F6E-BF9ADA3E2EC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26DF36E3-785F-4515-8999-BF48A255907F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F143436A-848B-443F-95E2-B20BC2403CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5B21D3-7955-450F-8357-A37905B963B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC67810-D2C5-4242-ACF2-CF7E9C56D7FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E485652B-FDE0-44C1-83F5-D22B16BEBB34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3A987C0-51DF-464C-8F4D-03C9CAD256EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"718E405D-4127-4D0E-85BB-83800264AD61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF72642B-8766-44A3-8CB0-D094929AAA6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF56D768-6D41-472D-AA42-0C209534AB30\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6066CFA2-202E-43A3-B1DF-36364ABD5A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13C922A9-05A3-4D98-A568-F780CCA87E39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44E9893A-2771-4C04-9F90-B10EE659088E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31DA3600-C955-46B0-8BD9-C9B3FC0B81EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7ED0C04-33BA-4F9B-97B0-BB5D30C2A0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E40CC0D-E7EF-4800-AC0B-5AF603B8BC6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16759F16-34C6-4C2C-BECB-12555EEEBDA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB331CC-3125-454E-BCBE-B85540B62110\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B46AB0-D925-4E74-8D15-40EE3BC0B14A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A60F86FA-B7D3-4BE5-82F2-05F2A5F5663D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9319A96-D510-47DB-9DBC-C16C0947E4C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40E0FDF1-E63C-48C9-98E2-55E3FD891882\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D22400-E6A1-4C3A-B16F-E14672B86D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DFA0996-4839-4FDB-9B9D-5F8424946F9A\"}]}]}],\"references\":[{\"url\":\"http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/35770\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.exploit-db.com/exploits/15856\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/01/13/2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/05/10/7\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/05/11/3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/05/12/5\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/64180\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/35770\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.exploit-db.com/exploits/15856\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/01/13/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/05/10/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/05/11/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/05/12/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/64180\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.