Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.803996
Kategorie:Web application abuses
Titel:TYPO3 Flowplayer Cross Site Scripting Vulnerability
Zusammenfassung:This host is installed with TYPO3 and is prone to cross site scripting;vulnerability.
Beschreibung:Summary:
This host is installed with TYPO3 and is prone to cross site scripting
vulnerability.

Vulnerability Insight:
An error exists in the Flowplayer which fails to sufficiently
sanitize user supplied input to 'linkUrl' parameter.

Vulnerability Impact:
Successful exploitation will allow remote attackers to execute script code.

Affected Software/OS:
TYPO3 version 4.5.0 to 4.5.28, 4.7.0 to 4.7.13, 6.0.0 to 6.0.7 and 6.1.0 to 6.1.2

Solution:
Upgrade to TYPO3 version 4.5.29, 4.7.14, 6.0.8, 6.1.3 or later.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: BugTraq ID: 48651
BugTraq ID: 57848
Common Vulnerability Exposure (CVE) ID: CVE-2011-3642
http://appsec.ws/Presentations/FlashFlooding.pdf
http://secunia.com/advisories/52074
http://secunia.com/advisories/54206
http://secunia.com/advisories/58854
http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-009
http://web.appsec.ws/FlashExploitDatabase.php
https://bugs.launchpad.net/mahara/+bug/1103748
https://code.google.com/p/flowplayer-core/issues/detail?id=441
https://mahara.org/interaction/forum/topic.php?id=5237
https://www.securityfocus.com/bid/48651
Common Vulnerability Exposure (CVE) ID: CVE-2013-1464
http://www.securityfocus.com/bid/57848
http://insight-labs.org/?p=738
http://packetstormsecurity.com/files/120129/WordPress-Audio-Player-SWF-Cross-Site-Scripting.html
http://wordpress.org/extend/plugins/audio-player/changelog/
http://secunia.com/advisories/52083
CopyrightCopyright (C) 2014 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.