CVE-2013-4321
Published May 20, 2014
Last updated 10 years ago
Overview
- Description
- The File Abstraction Layer (FAL) in TYPO3 6.0.x before 6.0.8 and 6.1.x before 6.1.4 allows remote authenticated editors to execute arbitrary PHP code via unspecified characters in the file extension when renaming a file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4250.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C140F242-CF7C-4CB6-A358-5C8DB0F26DAA" }, { "criteria": "cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81EAC0BA-B6AC-42BA-AEEE-946E1FBD770B" }, { "criteria": "cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD31180A-8BD6-49AC-A758-5FA4C9A7B4C8" }, { "criteria": "cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E06A3B0C-364F-42A3-803B-6CE1EAB386C8" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:typo3:typo3:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84C095F8-000A-4A8D-81DE-047810345A15" }, { "criteria": "cpe:2.3:a:typo3:typo3:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "976AAF6F-BF03-40B7-B7D2-22101BD857D7" }, { "criteria": "cpe:2.3:a:typo3:typo3:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E98D0D9-D9AE-44F7-8233-F92EB330B152" }, { "criteria": "cpe:2.3:a:typo3:typo3:6.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36EA784A-7C3A-41DA-B444-D01E3BC144BB" }, { "criteria": "cpe:2.3:a:typo3:typo3:6.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7294AA8B-0CD3-47A2-91DC-A882F7F3BDFC" }, { "criteria": "cpe:2.3:a:typo3:typo3:6.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D28DD85-FBB3-4DD4-B525-7AFD32BE55F6" }, { "criteria": "cpe:2.3:a:typo3:typo3:6.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80C21E07-5083-4C86-AA9D-FCB73F636060" }, { "criteria": "cpe:2.3:a:typo3:typo3:6.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DAE1BB4-2DBD-489E-B3F9-88CF414EAC2C" } ], "operator": "OR" } ] } ]