| Summary | TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing." |
|---|---|
| Publication Date | June 3, 2014, 11:55 p.m. |
| Registration Date | Jan. 26, 2021, 3:11 p.m. |
| Last Update | Nov. 21, 2024, 11:09 a.m. |
| CVSS2.0 : MEDIUM | |
| Score | 5.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:N/I:P/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | なし |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.17:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.18:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.14:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.15:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.16:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.7.9:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:typo3:typo3:4.5.30:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.27:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.24:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.32:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.23:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.26:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.29:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.31:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.33:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.25:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.22:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:4.5.28:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:typo3:typo3:6.2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.2.0:beta1:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.2.0:beta3:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.2.0:beta2:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.1.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.1.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.1.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.1.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:* | |||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:a:typo3:typo3:6.0.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:typo3:typo3:6.0.4:*:*:*:*:*:*:* | |||||
| Title | TYPO3 における脆弱性 |
|---|---|
| Summary | TYPO3 には、"ホストのなりすまし (Host Spoofing)" に関する処理に不備があるため、不特定の影響を受ける脆弱性が存在します。 |
| Possible impacts | 第三者により、巧妙に細工された HTTP Host ヘッダを介して、不特定の影響を受ける可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | May 22, 2014, midnight |
| Registration Date | June 5, 2014, 12:19 p.m. |
| Last Update | June 5, 2014, 12:19 p.m. |
| TYPO3 Association |
| TYPO3 4.5.0 以上 4.5.34 未満 |
| TYPO3 4.7.0 以上 4.7.19 未満 |
| TYPO3 6.0.0 以上 6.0.14 未満 |
| TYPO3 6.1.0 以上 6.1.9 未満 |
| TYPO3 6.2.0 以上 6.2.3 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2014年06月05日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |