Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5956

Опубликовано: 16 сент. 2015
Источник: debian

Описание

The sanitizeLocalUrl function in TYPO3 6.x before 6.2.15, 7.x before 7.4.0, 4.5.40, and earlier allows remote authenticated users to bypass the XSS filter and conduct cross-site scripting (XSS) attacks via a base64 encoded data URI, as demonstrated by the (1) returnUrl parameter to show_rechis.php and the (2) redirect_url parameter to index.php.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
typo3-srcremovedpackage
typo3-srcend-of-lifewheezypackage
typo3-srcend-of-lifesqueezepackage

Примечания

  • http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-009/

Связанные уязвимости

ubuntu
больше 10 лет назад

The sanitizeLocalUrl function in TYPO3 6.x before 6.2.15, 7.x before 7.4.0, 4.5.40, and earlier allows remote authenticated users to bypass the XSS filter and conduct cross-site scripting (XSS) attacks via a base64 encoded data URI, as demonstrated by the (1) returnUrl parameter to show_rechis.php and the (2) redirect_url parameter to index.php.

nvd
больше 10 лет назад

The sanitizeLocalUrl function in TYPO3 6.x before 6.2.15, 7.x before 7.4.0, 4.5.40, and earlier allows remote authenticated users to bypass the XSS filter and conduct cross-site scripting (XSS) attacks via a base64 encoded data URI, as demonstrated by the (1) returnUrl parameter to show_rechis.php and the (2) redirect_url parameter to index.php.

github
больше 3 лет назад

TYPO3 cross-site scripting (XSS)