Vulnerability Details : CVE-2012-3527
view_help.php in the backend help system in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote authenticated backend users to unserialize arbitrary objects and possibly execute arbitrary PHP code via an unspecified parameter, related to a "missing signature (HMAC)."
Products affected by CVE-2012-3527
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-3527
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-3527
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:N/AC:H/Au:S/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
CWE ids for CVE-2012-3527
-
Assigned by: nvd@nist.gov (Primary)
-
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3527
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/77791
Typo3 view_help.php code execution CVE-2012-3527 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://secunia.com/advisories/50287
Sign inNot Applicable
-
http://osvdb.org/84773
Broken Link
-
http://www.openwall.com/lists/oss-security/2012/08/22/8
oss-security - Re: CVE request: Typo3Mailing List
-
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/
Several Vulnerabilities in TYPO3 CoreVendor Advisory
-
http://www.debian.org/security/2012/dsa-2537
Debian -- Security Information -- DSA-2537-1 typo3-srcThird Party Advisory
Jump to