vendor:
TYPO3
by:
Lolek of TK53
7.5
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: TYPO3
Affected Version From: TYPO3 < 4.2.6, TYPO3 < 4.1.10, TYPO3 < 4.0.12
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
TYPO3-SA-2009-002 exploit by Lolek of TK53
This exploit is used to gain access to the content of a file on a TYPO3 server. It works by sending a request to the server with a jumpurl parameter set to the file to be accessed, a type parameter set to 0, a juSecure parameter set to 1, and a locationData parameter set to 1:. The server then responds with a juHash parameter which is used to access the content of the file. The exploit is used to gain access to the typo3conf/localconf.php file.
Mitigation:
Update TYPO3 to the latest version.