CVE-2007-6381
Published Dec 15, 2007
Last updated 7 years ago
Overview
- Description
- SQL injection vulnerability in the indexed_search system extension in TYPO3 3.x, 4.0 through 4.0.7, and 4.1 through 4.1.3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F1C59B0-CDF2-4F9A-88C7-61E8F18590DB" }, { "criteria": "cpe:2.3:a:typo3:typo3:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "395C04FB-3390-4E97-B2F1-BEF9C42F15E8" }, { "criteria": "cpe:2.3:a:typo3:typo3:3.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E53B002D-18FD-4C6A-97C0-AA9C83ABD382" }, { "criteria": "cpe:2.3:a:typo3:typo3:3.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3885B69F-B9C0-488F-8775-E8E801418E57" }, { "criteria": "cpe:2.3:a:typo3:typo3:3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3390E31-A149-4D83-94D2-63AF63D02A01" }, { "criteria": "cpe:2.3:a:typo3:typo3:3.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA565238-52C8-4850-8FDA-C38C057BF6F1" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25EAE65C-1E17-48CD-B48C-E0BC09FB6596" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "501A9157-044A-4856-8092-418D7329EED3" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EA47174-9BC4-4B74-8618-6A7B0773553B" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A13146E-EC04-4354-9123-BC7CB292C66A" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F27B173-8D10-47F7-8450-F8808A918295" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D1FAD0A-6B98-476B-BCD2-361996CA1C36" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE992D57-AF82-4BF0-96E8-98110C0AEBF3" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A9A484F-C34D-4885-8125-D9C8725EEB4E" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2F271C6-B5A7-4B06-A3DF-4C7F74090CC8" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "161E310F-F2D8-40B3-8390-8C52ACDD0B72" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6B33D32-4D59-4768-A2C6-9DC7CD30F5E6" }, { "criteria": "cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4679B5DF-25FA-40E9-A322-DF1FF1BC7E7C" } ], "operator": "OR" } ] } ]