Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 10 Apr 2010 20:10:34 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: CVE request: typo3 remote command execution

http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-008/

 The TYPO3 autoloader does not validate passed arguments.

You are not vulnerable if at least one of following conditions is met:

   1. You are using any other TYPO3 version than 4.3.0, 4.3.1 or 4.3.2 (+ 
development releases of 4.4 branch).
   2. You have at least one of following PHP configuration variables set to 
"off": register_globals ("off" by default, advised to be "off" in TYPO3 
Security Cookbook), allow_url_include ("off" by default) and allow_url_fopen 
("on" by default)
   3. You are using Suhosin and haven't put URL schemes in configuration 
variable "suhosin.executor.include.whitelist".

Possible Impact: A crafted request to a vulnerable TYPO3 installation will 
allow an attacker to load PHP code from an external server and to execute it 
on the TYPO3 installation. 
-- 
Hanno Böck		Blog:		http://www.hboeck.de/
GPG: 3DBD3B20		Jabber/Mail:	hanno@...eck.de

http://schokokeks.org - professional webhosting

Download attachment "signature.asc " of type "application/pgp-signature" (199 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.