Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.803980 |
Kategorie: | Web application abuses |
Titel: | TYPO3 Debug Script Information Disclosure Vulnerability |
Zusammenfassung: | This host is installed with TYPO3 and is prone to information disclosure;vulnerability. |
Beschreibung: | Summary: This host is installed with TYPO3 and is prone to information disclosure vulnerability. Vulnerability Insight: Multiple errors exist in the application: - An error exists in debug script which executes phpinfo() function, which makes environment variables world readable. - An error exists in TYPO3 Page Cache. - An error exists in config.baseURL, which could be used to spoof a malicious baseURL into your TYPO3 cache. - An error exists in TYPO3 Install Tool, which does not generate a secure encryptionKey - An error exists in showpic.php, which fails to sanatize user inputs properly. - An error exists in application, which does not forbidden access to 'fileadmin/_temp_/' directory Vulnerability Impact: Successful exploitation will allow remote attackers to obtain sensitive environment variables information or may lead to DoS. Affected Software/OS: TYPO3 version before 3.8.1 Solution: Upgrade to TYPO3 version 3.8.1 or later. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-4875 http://bugs.typo3.org/view.php?id=1250 XForce ISS Database: tyop3-debugscript-info-disclosure(42457) https://exchange.xforce.ibmcloud.com/vulnerabilities/42457 |
Copyright | Copyright (C) 2013 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |