| Title | TYPO3 の Backend History モジュールにおける SQL インジェクションの脆弱性 |
|---|---|
| Summary | TYPO3 の Backend History モジュールには、SQL インジェクションの脆弱性が存在します。 |
| Possible impacts | リモート認証されたバックエンドユーザにより、任意の SQL コマンドを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Nov. 8, 2012, midnight |
| Registration Date | July 3, 2013, 4:03 p.m. |
| Last Update | July 3, 2013, 4:03 p.m. |
| CVSS2.0 : 警告 | |
| Score | 6.5 |
|---|---|
| Vector | AV:N/AC:L/Au:S/C:P/I:P/A:P |
| TYPO3 Association |
| TYPO3 4.5.21 未満の 4.5.x |
| TYPO3 4.6.14 未満の 4.6.x |
| TYPO3 4.7.6 未満の 4.7.x |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2013年07月03日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | SQL injection vulnerability in the Backend History module in TYPO3 4.5.x before 4.5.21, 4.6.x before 4.6.14, and 4.7.x before 4.7.6 allows remote authenticated backend users to execute arbitrary SQL commands via unspecified vectors. |
|---|---|
| Publication Date | July 2, 2013, 6:55 a.m. |
| Registration Date | Jan. 28, 2021, 3:07 p.m. |
| Last Update | Nov. 21, 2024, 10:45 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:* | |||||