Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-5099

Опубликовано: 30 мая 2012
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8

Описание

The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly filter file types, which allows remote attackers to bypass intended access restrictions and access arbitrary PHP files, as demonstrated using path traversal sequences with %00 null bytes and CVE-2010-3714 to read the TYPO3 encryption key from localconf.php.

РелизСтатусПримечание
devel

not-affected

hardy

ignored

end of life
lucid

ignored

end of life
natty

not-affected

4.3.9+dfsg1-1
oneiric

not-affected

precise

not-affected

quantal

not-affected

raring

not-affected

saucy

not-affected

upstream

released

4.3.9,4.4.5

Показывать по

6.8 Medium

CVSS2

Связанные уязвимости

nvd
больше 13 лет назад

The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly filter file types, which allows remote attackers to bypass intended access restrictions and access arbitrary PHP files, as demonstrated using path traversal sequences with %00 null bytes and CVE-2010-3714 to read the TYPO3 encryption key from localconf.php.

debian
больше 13 лет назад

The fileDenyPattern functionality in the PHP file inclusion protection ...

github
больше 3 лет назад

TYPO3 Path Traversal vulnerability

6.8 Medium

CVSS2