Vulnerability Description
Unspecified vulnerability in the CWT Frontend Edit (cwt_feedit) extension before 1.2.5 for TYPO3 allows remote authenticated users to execute arbitrary code via unknown vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cwt Frontend Edit Project | Cwt Frontend Edit | <= 1.2.4 |
References
- http://secunia.com/advisories/60888
- http://typo3.org/extensions/repository/view/cwt_feeditPatch
- http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-saPatchVendor Advisory
- http://www.securityfocus.com/bid/69562
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95700
- http://secunia.com/advisories/60888
- http://typo3.org/extensions/repository/view/cwt_feeditPatch
- http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-saPatchVendor Advisory
- http://www.securityfocus.com/bid/69562
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95700
FAQ
What is CVE-2014-6231?
CVE-2014-6231 is a vulnerability with a CVSS score of 7.5 (HIGH). Unspecified vulnerability in the CWT Frontend Edit (cwt_feedit) extension before 1.2.5 for TYPO3 allows remote authenticated users to execute arbitrary code via unknown vectors.
How severe is CVE-2014-6231?
CVE-2014-6231 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6231?
Check the references section above for vendor advisories and patch information. Affected products include: Cwt Frontend Edit Project Cwt Frontend Edit.