Improper Input Validation Affecting typo3-src package, versions *


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.7% (81st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU1404-TYPO3SRC-371200
  • published4 Jan 2015
  • disclosed4 Jan 2015

Introduced: 4 Jan 2015

CVE-2014-9509  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

There is no fixed version for Ubuntu:14.04 typo3-src.

NVD Description

Note: Versions mentioned in the description apply only to the upstream typo3-src package and not the typo3-src package as distributed by Ubuntu. See How to fix? for Ubuntu:14.04 relevant fixed versions and status.

The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set to all or cached, allows remote attackers to have an unspecified impact (possibly resource consumption) via a "Cache Poisoning" attack using a URL with arbitrary arguments, which triggers a reload of the page.

CVSS Scores

version 3.1