Vulnerability Details : CVE-2009-3635
The Install Tool subcomponent in TYPO3 4.0.13 and earlier, 4.1.x before 4.1.13, 4.2.x before 4.2.10, and 4.3.x before 4.3beta2 allows remote attackers to gain access by using only the password's md5 hash as a credential.
Vulnerability category: BypassGain privilege
Exploit prediction scoring system (EPSS) score for CVE-2009-3635
Probability of exploitation activity in the next 30 days: 1.65%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 86 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-3635
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
[email protected] |
CWE ids for CVE-2009-3635
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: [email protected] (Primary)
References for CVE-2009-3635
- http://www.securityfocus.com/bid/36801
- http://marc.info/?l=oss-security&m=125632856206736&w=2
-
http://www.vupen.com/english/advisories/2009/3009
Patch;Vendor Advisory
-
http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-016/
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/53928
Products affected by CVE-2009-3635
- cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:3.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:3.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:3.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:3.6.x:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:3.8.x:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3:alpha1:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:3.7.x:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:3.3.x:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:3.5.x:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:1.1.09:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:1.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:1.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:0.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:1.3.2:*:*:*:*:*:*:*