Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-9509 (GCVE-0-2014-9509)
Vulnerability from cvelistv5 – Published: 2015-01-04 21:00 – Updated: 2024-09-17 03:13- n/a
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T13:47:40.850Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set to all or cached, allows remote attackers to have an unspecified impact (possibly resource consumption) via a \"Cache Poisoning\" attack using a URL with arbitrary arguments, which triggers a reload of the page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-01-04T21:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-9509",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set to all or cached, allows remote attackers to have an unspecified impact (possibly resource consumption) via a \"Cache Poisoning\" attack using a URL with arbitrary arguments, which triggers a reload of the page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/",
"refsource": "CONFIRM",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-9509",
"datePublished": "2015-01-04T21:00:00.000Z",
"dateReserved": "2015-01-04T00:00:00.000Z",
"dateUpdated": "2024-09-17T03:13:04.483Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CNVD-2015-00160
Vulnerability from cnvd - Published: 2015-01-09用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/
| Name | ['TYPO3 Typo3 4.5.x < 4.5.39', 'TYPO3 Typo3 7.x < 7.0.2', 'TYPO3 Typo3 4.6.x - 6.2.x(<6.2.9)'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2014-9509"
}
},
"description": "TYPO3\u662f\u5f00\u6e90\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf\uff08CMS\uff09\u548c\u5185\u5bb9\u7ba1\u7406\u6846\u67b6\uff08CMF\uff09\u3002\r\n\r\nTYPO3\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\"Cache Poisoning\"\u4f7f\u7528\u4efb\u610f\u53c2\u6570\u548cURL\uff0c\u89e6\u53d1\u9875\u9762\u91cd\u65b0\u52a0\u8f7d\u4ea7\u751f\u672a\u660e\u5f71\u54cd\u3002",
"discovererName": "Helmut Hummel",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-00160",
"openTime": "2015-01-09",
"patchDescription": "TYPO3\u662f\u5f00\u6e90\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf\uff08CMS\uff09\u548c\u5185\u5bb9\u7ba1\u7406\u6846\u67b6\uff08CMF\uff09\u3002 \r\n\r\nTYPO3\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\"Cache Poisoning\"\u4f7f\u7528\u4efb\u610f\u53c2\u6570\u548cURL\uff0c\u89e6\u53d1\u9875\u9762\u91cd\u65b0\u52a0\u8f7d\u4ea7\u751f\u672a\u660e\u5f71\u54cd\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "TYPO3\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"TYPO3 Typo3 4.5.x \u003c 4.5.39",
"TYPO3 Typo3 7.x \u003c 7.0.2",
"TYPO3 Typo3 4.6.x - 6.2.x(\u003c6.2.9)"
]
},
"referenceLink": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/\r\nhttp://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9509",
"serverity": "\u9ad8",
"submitTime": "2015-01-08",
"title": "TYPO3\u5b58\u5728\u672a\u660e\u6f0f\u6d1e"
}
FKIE_CVE-2014-9509
Vulnerability from fkie_nvd - Published: 2015-01-04 21:59 - Updated: 2025-04-12 10:46| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/ | Exploit, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/ | Exploit, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6523E669-DD41-4A28-A4D4-83CC8BE0143B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "868534F5-9CEE-48F8-BD2F-EDD8F9F5D302",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD9A9F1-28EA-4B39-9D2D-74E7F86B1355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2B855F-5281-4DE6-A3C2-F579FDE5FD60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4F773E8B-F81C-4A04-8A78-0576CB899A43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B48937-411B-468D-B35C-73BA0DCE7A03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "867200CE-C689-4E6F-9D56-565B6D841494",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E3EDD9F0-BBE2-4A79-B1A1-6CD31939A5EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAEAFB6-4FA3-4586-A7D6-ED269433220A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDAE81E-15AD-4C1D-8989-9EFA6445885F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D451E97C-061F-43D3-B3B3-FD46C694C934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5E8DF53F-3E5A-485E-8430-348207EBFF81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BC68F0F3-89BC-4398-95EE-6358094B284B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "28352CAB-EF6C-43DC-9487-202151B18612",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "635C90E5-BBCE-4662-BC16-4F04FCE04785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "32D324F6-E73B-4F54-A4B1-431550C08341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "96AC3681-104E-4A33-B9F7-F648DB4B8193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "8FE92575-D6F5-4304-8347-19E75EA35331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "9F1954F5-A6EF-4A95-976E-5295197EEB2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "71834B10-8897-466C-9B2E-21FC04400540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BB69F7E9-001D-42B3-BEB4-B294737AD27B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "34E8530B-0311-45AA-92B4-6FF2CE388E71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A53B9001-C5B4-4D19-A314-118E3A292346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.23:*:*:*:*:*:*:*",
"matchCriteriaId": "E663FE0B-B509-4427-A2A0-9EB53E26810F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3FA36C35-E9BD-4ED2-B6CB-950D641678E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.25:*:*:*:*:*:*:*",
"matchCriteriaId": "12A54839-425D-4D28-8AD2-479A593474FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.26:*:*:*:*:*:*:*",
"matchCriteriaId": "83542527-9738-46C0-A4D2-D5E2E203CD49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.27:*:*:*:*:*:*:*",
"matchCriteriaId": "72B68AE9-081A-4BE0-A2AF-969216D26637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.28:*:*:*:*:*:*:*",
"matchCriteriaId": "253A3E84-401E-4F9F-8A9A-B8C464C69929",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.29:*:*:*:*:*:*:*",
"matchCriteriaId": "08742759-FFC8-4908-B319-4EC279C6AB74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.30:*:*:*:*:*:*:*",
"matchCriteriaId": "CC4B4B3F-D7BE-493C-ABF6-416FF89C4A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.31:*:*:*:*:*:*:*",
"matchCriteriaId": "36748261-81EF-4E39-8EC5-A67F054B623F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.32:*:*:*:*:*:*:*",
"matchCriteriaId": "21CC1BD2-CB44-4C0F-8B87-6272AEEBDEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.33:*:*:*:*:*:*:*",
"matchCriteriaId": "D7129E4A-834D-4405-853B-89F1BD7965E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.34:*:*:*:*:*:*:*",
"matchCriteriaId": "E80654F2-42D2-4E47-B069-126327B83C7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.35:*:*:*:*:*:*:*",
"matchCriteriaId": "AABC3190-44FF-4F75-BBA6-CE9D1BAC4096",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.36:*:*:*:*:*:*:*",
"matchCriteriaId": "4ADA397D-D126-456C-BE3B-D129197CEA19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.37:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7399A6-3078-458B-BF84-39081214BC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.5.38:*:*:*:*:*:*:*",
"matchCriteriaId": "24D7D3E2-00DF-4F93-8978-24EAFAA6A916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88CBAAC7-5207-45E8-86D5-18D98259070D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5FAAF258-882A-46AE-B32C-7569A79C1DAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB6F1E7-351D-45E7-9571-2AF4283080DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B3B4A9-BDC7-4426-98FB-398B63AF3D18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0016A078-1291-4281-BA62-5A846AEE7584",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F11DB8A8-8309-4FC9-BA35-1AFFC5B4AE8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9661D2DB-F24C-478B-B691-303D48D9B158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1F1FD6B9-7FAC-4508-962A-99AF63EB4B36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "14369AD5-2622-4530-BCD5-A95C032CE4CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D7CBAD29-18E9-4097-88FA-4D287A9A877A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5144AE-E076-48B5-9EA3-2F0BEC34D92F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "46246047-B415-437A-AC0E-2A7157D47C17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6C98937C-C769-40C9-841F-D9F0A49AAE4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7C54D4-B953-442F-99A8-96B505C15DCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "495B1280-1C65-45FE-B5C5-ED1BD7AF429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "8A6CE19A-3985-45AC-9DF5-64572AA9ECC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA8422F-5A4B-4696-AF31-F1128FCF482F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA625B3-16A2-436F-A63D-0B5200BAA955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "13FE26EF-79DC-4907-A593-414679AAE9B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "36FFBD83-F3FE-4913-8578-98F27E39A73C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AA3E69-C22E-463C-837F-42EE6B59E350",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "082BD28F-5FEE-4D25-98CF-27513DBF0E39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "86F5F3DD-55D7-4028-A228-2A737A51FDE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F89DD9F-019A-4AD3-AD0E-4F20F1AF5C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "684500C9-8532-45C4-8F29-33AAC3DDA3AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2F830A8F-C51C-4CED-BCA2-845C312087FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2C537426-82DB-426B-BB95-CC119C20266A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D3AE18-7B26-4448-AF98-0D2692C80BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E8AD3ED8-5107-418D-8F0F-6B07845D3C74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A2FEFD3C-A4CC-4FCC-8ECD-3EE1E69DE58D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0E1EE4B6-9256-494E-A11B-9700F0376AC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.12:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0A8566-4A01-4948-A237-3CED2D065FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B5459D18-7283-4650-9304-7F576AB1D779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B404C733-4F5C-4EB2-B4B9-F25A95BB6E2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.15:*:*:*:*:*:*:*",
"matchCriteriaId": "31BDE85A-5F76-4249-9B38-B3A1649F777D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6357ACD4-E404-489A-B218-1CED134F4893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B6650206-8DD5-4D05-BBD2-15A12842117B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.18:*:*:*:*:*:*:*",
"matchCriteriaId": "8D9712BC-E1C2-46AF-8111-DE5523DFF3DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.19:*:*:*:*:*:*:*",
"matchCriteriaId": "17025DCC-2685-4EC4-BD0B-34F768181A48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:4.7.20:*:*:*:*:*:*:*",
"matchCriteriaId": "81FC167D-7CD8-42B1-AD3B-B6534BB8203E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84C095F8-000A-4A8D-81DE-047810345A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "976AAF6F-BF03-40B7-B7D2-22101BD857D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6E98D0D9-D9AE-44F7-8233-F92EB330B152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "36EA784A-7C3A-41DA-B444-D01E3BC144BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7294AA8B-0CD3-47A2-91DC-A882F7F3BDFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D28DD85-FBB3-4DD4-B525-7AFD32BE55F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "80C21E07-5083-4C86-AA9D-FCB73F636060",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAE1BB4-2DBD-489E-B3F9-88CF414EAC2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0724FE19-F0A4-4055-996A-2B7844CAC426",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A862C28E-B1B9-4541-A559-D0BD16E575B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EA1DE94A-DDCD-4067-A0C0-16904F6B7EC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C6DD4A1-C865-4AC8-86BC-8F92319F33A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7ACA06-C0C1-4EEA-A629-C453C97660A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3C444E62-897D-4C7A-AEC6-C5728166A11A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF13769-3F5A-4766-A8DA-8B939CB1AB2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C140F242-CF7C-4CB6-A358-5C8DB0F26DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81EAC0BA-B6AC-42BA-AEEE-946E1FBD770B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD31180A-8BD6-49AC-A758-5FA4C9A7B4C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E06A3B0C-364F-42A3-803B-6CE1EAB386C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "692DE690-C921-403B-9966-60CB23FF5D02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "94C181FE-F3A9-4C7E-955F-0CCD4E6B4DAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "11DD1626-884F-40EE-9721-2FCF7F14F781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BFFF68DC-AFBB-4055-83AF-BAFE9C68FBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C0F0FB1F-45D1-49A8-8882-393B16E6AA34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A51F600B-F3BB-4C8A-8188-3F5E4D59114B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C7715060-1441-4CF9-BEDF-91D28FE31ECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7183456A-52B4-4386-8979-A2ECEA9959FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "16EEC79F-3293-451C-864E-9CE020F6C730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "8FD27EAD-04D5-4C55-952E-020954B90CEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99262E73-E4A7-4657-A32E-3C289C052675",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E230A800-B2DE-4ED4-9C6B-961832C39900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1A96891D-A2B1-492C-A914-51F9631D5C40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3D7316A8-E445-45C6-BFD9-8E19254AC7AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D95C12B4-51F1-4FFC-892B-1432D1E5219A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "308EF598-B9DF-47C5-A1AC-1A2A16767E84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A3A5E5D-E8A9-4B2F-B423-9F1B9E761A9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:6.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9EDF6E-299A-4277-9C2F-B25D5F9A189E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC254112-3695-422E-BD5B-B5E65F61B4B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:typo3:typo3:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC7DF87-E8E8-4333-8549-5607328399BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set to all or cached, allows remote attackers to have an unspecified impact (possibly resource consumption) via a \"Cache Poisoning\" attack using a URL with arbitrary arguments, which triggers a reload of the page."
},
{
"lang": "es",
"value": "El componente frontend rendering en TYPO3 4.5.x anterior a 4.5.39, 4.6.x hasta 6.2.x anterior a 6.2.9, y 7.x anterior a 7.0.2, cuando config.prefixLocalAnchors est\u00e1 configurado a todo o en cach\u00e9, permite a atacantes remotos tener un impacto no especificado (posiblemente consumo de recursos) a trav\u00e9s de un ataque de envenenamiento del cach\u00e9 (\u0027Cache Poisoning\u0027) utilizando una URL con argumentos arbitrarios, lo que provoca un recarga de la p\u00e1gina."
}
],
"id": "CVE-2014-9509",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-04T21:59:07.120",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2014-9509
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2014-9509",
"description": "The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set to all or cached, allows remote attackers to have an unspecified impact (possibly resource consumption) via a \"Cache Poisoning\" attack using a URL with arbitrary arguments, which triggers a reload of the page.",
"id": "GSD-2014-9509"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2014-9509"
],
"details": "The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set to all or cached, allows remote attackers to have an unspecified impact (possibly resource consumption) via a \"Cache Poisoning\" attack using a URL with arbitrary arguments, which triggers a reload of the page.",
"id": "GSD-2014-9509",
"modified": "2023-12-13T01:22:48.366660Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-9509",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set to all or cached, allows remote attackers to have an unspecified impact (possibly resource consumption) via a \"Cache Poisoning\" attack using a URL with arbitrary arguments, which triggers a reload of the page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/",
"refsource": "CONFIRM",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=4.5.0,\u003c4.5.39||\u003e=4.6.0,\u003c=4.6.18||\u003e=4.7.0,\u003c=4.7.20||\u003e=6.0.0,\u003c=6.0.14||\u003e=6.1.0,\u003c=6.1.12||\u003e=6.2.0,\u003c6.2.9||\u003e=7.0.0,\u003c7.0.2",
"affected_versions": "All versions starting from 4.5.0 before 4.5.39, all versions starting from 4.6.0 up to 4.6.18, all versions starting from 4.7.0 up to 4.7.20, all versions starting from 6.0.0 up to 6.0.14, all versions starting from 6.1.0 up to 6.1.12, all versions starting from 6.2.0 before 6.2.9, all versions starting from 7.0.0 before 7.0.2",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2023-08-16",
"description": "The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set to all or cached, allows remote attackers to have an unspecified impact (possibly resource consumption) via a \"Cache Poisoning\" attack using a URL with arbitrary arguments, which triggers a reload of the page.",
"fixed_versions": [
"4.5.39",
"6.2.9",
"4.6.19",
"7.0.2",
"4.7.21",
"6.0.15",
"6.1.13"
],
"identifier": "CVE-2014-9509",
"identifiers": [
"GHSA-5479-gqqr-f9gj",
"CVE-2014-9509"
],
"not_impacted": "All versions before 4.5.0, all versions starting from 4.5.39 before 4.6.0, all versions after 4.6.18 before 4.7.0, all versions after 4.7.20 before 6.0.0, all versions after 6.0.14 before 6.1.0, all versions after 6.1.12 before 6.2.0, all versions starting from 6.2.9 before 7.0.0, all versions starting from 7.0.2",
"package_slug": "packagist/typo3/cms",
"pubdate": "2022-05-17",
"solution": "Upgrade to versions 4.5.39, 6.2.9, 4.6.19, 7.0.2, 4.7.21, 6.0.15, 6.1.13 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2014-9509",
"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/",
"https://github.com/advisories/GHSA-5479-gqqr-f9gj"
],
"uuid": "7f65cd6a-1761-478a-8885-9e33fbc72578"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:7.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:7.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.0:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:6.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-9509"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set to all or cached, allows remote attackers to have an unspecified impact (possibly resource consumption) via a \"Cache Poisoning\" attack using a URL with arbitrary arguments, which triggers a reload of the page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2015-01-06T14:42Z",
"publishedDate": "2015-01-04T21:59Z"
}
}
}
GHSA-5479-GQQR-F9GJ
Vulnerability from github – Published: 2022-05-17 04:18 – Updated: 2023-08-16 23:14Problem Description: A request URL with arbitrary arguments, but still pointing to the home page of a TYPO3 installation can be cached if the configuration option config.prefixLocalAnchors is used with the values "all" or "cached". The impact of this vulnerability is that unfamiliar looking links to the home page can end up in the cache, which leads to a reload of the page in the browser when section links are followed by web page visitors, instead of just directly jumping to the requested section of the page. TYPO3 versions 4.6.x and higher are only affected if the homepage is not a shortcut to a different page.
Solution: Removing the configuration options config.prefixLocalAnchors (and optionally also config.baseUrl) in favor of config.absRefPrefix
Credits: Thanks to Gernot Leitgab who discovered and reported the vulnerability.
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "typo3/cms"
},
"ranges": [
{
"events": [
{
"introduced": "4.5.0"
},
{
"fixed": "4.5.39"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "typo3/cms"
},
"ranges": [
{
"events": [
{
"introduced": "6.2.0"
},
{
"fixed": "6.2.9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "typo3/cms"
},
"ranges": [
{
"events": [
{
"introduced": "7.0.0"
},
{
"fixed": "7.0.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 4.6.18"
},
"package": {
"ecosystem": "Packagist",
"name": "typo3/cms"
},
"ranges": [
{
"events": [
{
"introduced": "4.6.0"
},
{
"fixed": "4.6.19"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 4.7.20"
},
"package": {
"ecosystem": "Packagist",
"name": "typo3/cms"
},
"ranges": [
{
"events": [
{
"introduced": "4.7.0"
},
{
"fixed": "4.7.21"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 6.0.14"
},
"package": {
"ecosystem": "Packagist",
"name": "typo3/cms"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0"
},
{
"fixed": "6.0.15"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 6.1.12"
},
"package": {
"ecosystem": "Packagist",
"name": "typo3/cms"
},
"ranges": [
{
"events": [
{
"introduced": "6.1.0"
},
{
"fixed": "6.1.13"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2014-9509"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true,
"github_reviewed_at": "2023-08-16T23:14:19Z",
"nvd_published_at": "2015-01-04T21:59:00Z",
"severity": "HIGH"
},
"details": "**Problem Description:** A request URL with arbitrary arguments, but still pointing to the home page of a TYPO3 installation can be cached if the configuration option `config.prefixLocalAnchors` is used with the values \"all\" or \"cached\". The impact of this vulnerability is that unfamiliar looking links to the home page can end up in the cache, which leads to a reload of the page in the browser when section links are followed by web page visitors, instead of just directly jumping to the requested section of the page. TYPO3 versions 4.6.x and higher are only affected if the homepage is not a shortcut to a different page.\n\n**Solution:** Removing the configuration options `config.prefixLocalAnchors` (and optionally also config.baseUrl) in favor of `config.absRefPrefix`\n\n**Credits:** Thanks to Gernot Leitgab who discovered and reported the vulnerability.\n\n",
"id": "GHSA-5479-gqqr-f9gj",
"modified": "2023-08-16T23:14:19Z",
"published": "2022-05-17T04:18:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9509"
},
{
"type": "WEB",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Typo3 Vulnerable to Cache Poisoning"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.