Vulnerability identifier: #VU44259
Vulnerability risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID:
CWE-ID:
CWE-94
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
TYPO3
Web applications /
CMS
Vendor: TYPO3
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
PHP remote file inclusion vulnerability in Classes/Controller/AbstractController.php in the workspaces system extension in TYPO3 4.5.x before 4.5.9, 4.6.x before 4.6.2, and development versions of 4.7 allows remote attackers to execute arbitrary PHP code via a URL in the BACK_PATH parameter.
Mitigation
Install update from vendor's website.
Vulnerable software versions
TYPO3: 4.5 - 4.6.1
External links
https://secunia.com/advisories/47201
https://typo3.org/fileadmin/security-team/bug32571/32571.diff
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2011-004/
https://www.openwall.com/lists/oss-security/2011/12/16/1
https://www.osvdb.org/77776
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.