Vulnerability Description
The start function in class.t3lib_formmail.php in TYPO3 before 4.0.5, 4.1beta, and 4.1RC1 allows attackers to inject arbitrary email headers via unknown vectors. NOTE: some details were obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typo3 | Typo3 | <= 4.0.4 |
References
- http://osvdb.org/33471
- http://secunia.com/advisories/24207
- http://typo3.org/teams/security/security-bulletins/typo3-20070221-1
- http://www.securityfocus.com/bid/22668
- http://www.vupen.com/english/advisories/2007/0697
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32630
- http://osvdb.org/33471
- http://secunia.com/advisories/24207
- http://typo3.org/teams/security/security-bulletins/typo3-20070221-1
- http://www.securityfocus.com/bid/22668
- http://www.vupen.com/english/advisories/2007/0697
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32630
FAQ
What is CVE-2007-1081?
CVE-2007-1081 is a vulnerability with a CVSS score of 7.5 (HIGH). The start function in class.t3lib_formmail.php in TYPO3 before 4.0.5, 4.1beta, and 4.1RC1 allows attackers to inject arbitrary email headers via unknown vectors. NOTE: some details were obtained from...
How severe is CVE-2007-1081?
CVE-2007-1081 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1081?
Check the references section above for vendor advisories and patch information. Affected products include: Typo3 Typo3.