CVE-2012-6577
Published Jun 27, 2013
Last updated 7 years ago
Overview
- Description
- SQL injection vulnerability in the Formhandler extension before 1.4.1 for TYPO3 allows remote authenticated users with certain permissions to execute arbitrary SQL commands via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 6.4
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:typoheads:formhandler:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76CCC153-4300-4432-8594-679C4616841B", "versionEndIncluding": "1.4.0" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "600A1B78-85DA-4E95-9F5E-F18C1F0FC18F" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0393982-19A0-402C-BA22-93F4B350894E" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7625E110-1051-4DE8-9B37-96124D1E7B1D" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "066424CE-B605-45E8-A70F-53FDC8842518" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D68E43D-C6AB-4DA6-BAB5-1A29633F7CDF" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "818E5B56-23AF-4690-BD72-2AD94B6E4221" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EF81164-A0CF-4BFC-A5EB-0AA96BEA7024" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC782F92-D06C-4CEA-B672-F22FC50A0BB2" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C082526-5190-4354-A3CA-F1274FCAC57C" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1B52E1F-AC47-44F5-9E28-01152985E0EE" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D369BE4A-1E59-4351-AF7D-671F241C549D" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14316BEE-551B-4B48-80D8-F94CA860CC2B" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "260C0408-C199-4253-BF35-3D1E58C8F505" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:0.9.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91D70754-7157-4BF6-AAD5-FB4618EDE3F1" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6E97CE6-95CA-4674-8B34-338FD0B602BD" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "719681F1-843D-4235-B04E-DC0BAEEACE00" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87DD96D4-EE8F-4F43-85FF-93D564BADF22" }, { "criteria": "cpe:2.3:a:typoheads:formhandler:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1368E706-BA9A-46E5-B8C7-74428A7F118B" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:typo3:typo3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E66C5ABA-7727-4562-A792-5E450098D520" } ], "operator": "OR" } ], "operator": "AND" } ]