Vulnerability Description
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 contains an insecure default value of the variable fileDenyPattern which could allow remote attackers to execute arbitrary code on the backend.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typo3 | Typo3 | < 4.1.14 |
Related Weaknesses (CWE)
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719Mailing ListThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2010-3663Third Party Advisory
- https://typo3.org/security/advisory/typo3-sa-2010-012/#Arbitrary_Code_ExecutionVendor Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719Mailing ListThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2010-3663Third Party Advisory
- https://typo3.org/security/advisory/typo3-sa-2010-012/#Arbitrary_Code_ExecutionVendor Advisory
FAQ
What is CVE-2010-3663?
CVE-2010-3663 is a vulnerability with a CVSS score of 8.8 (HIGH). TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 contains an insecure default value of the variable fileDenyPattern which could allow remote attackers to execute arb...
How severe is CVE-2010-3663?
CVE-2010-3663 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-3663?
Check the references section above for vendor advisories and patch information. Affected products include: Typo3 Typo3.