It was found that Typo3 Core versions 4.5.0 - 4.5.5 uses prepared statements that, if the parameter values are not properly replaced, could lead to a SQL Injection vulnerability. This issue can only be exploited if two or more parameters are bound to the query and at least two come from user input.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/cve-2011-3583 | Broken Link |
https://typo3.org/security/advisory/typo3-core-sa-2011-002/ | Vendor Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=641682 | Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2011-3583 | Third Party Advisory |
Configurations
Information
Published : 2019-11-25 16:15
Updated : 2019-12-05 08:21
NVD link : CVE-2011-3583
Mitre link : CVE-2011-3583
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
typo3
- typo3