Vulnerability Description
Cross-site scripting (XSS) vulnerability in the errorAction method in the ActionController base class in TYPO3 Flow (formerly FLOW3) 1.1.x before 1.1.1 and 2.0.x before 2.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified input, which is returned in an error message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typo3 | Flow | 1.1.0 |
Related Weaknesses (CWE)
References
- http://osvdb.org/100825
- http://secunia.com/advisories/55996Vendor Advisory
- http://typo3.org/teams/security/security-bulletins/typo3-flow/typo3-flow-sa-2013Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89614
- http://osvdb.org/100825
- http://secunia.com/advisories/55996Vendor Advisory
- http://typo3.org/teams/security/security-bulletins/typo3-flow/typo3-flow-sa-2013Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89614
FAQ
What is CVE-2013-7082?
CVE-2013-7082 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site scripting (XSS) vulnerability in the errorAction method in the ActionController base class in TYPO3 Flow (formerly FLOW3) 1.1.x before 1.1.1 and 2.0.x before 2.0.1 allows remote attackers t...
How severe is CVE-2013-7082?
CVE-2013-7082 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7082?
Check the references section above for vendor advisories and patch information. Affected products include: Typo3 Flow.