CVE-2010-3659 (GCVE-0-2010-3659)
Vulnerability from cvelistv5
Published
2017-10-20 18:00
Modified
2024-08-07 03:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 CMS 4.1.x before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4, and 4.4.x before 4.4.1 allow remote authenticated backend users to inject arbitrary web script or HTML via unspecified parameters to the extension manager, or unspecified parameters to unknown backend forms.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:51.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2010-3659/" }, { "name": "[oss-security] 20140212 Re: Old CVE ids, public, but still", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/02/12/8" }, { "name": "[oss-security] 20100928 CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/8" }, { "name": "42029", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42029" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 CMS 4.1.x before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4, and 4.4.x before 4.4.1 allow remote authenticated backend users to inject arbitrary web script or HTML via unspecified parameters to the extension manager, or unspecified parameters to unknown backend forms." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-25T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2010-3659/" }, { "name": "[oss-security] 20140212 Re: Old CVE ids, public, but still", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/02/12/8" }, { "name": "[oss-security] 20100928 CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/8" }, { "name": "42029", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42029" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3659", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 CMS 4.1.x before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4, and 4.4.x before 4.4.1 allow remote authenticated backend users to inject arbitrary web script or HTML via unspecified parameters to the extension manager, or unspecified parameters to unknown backend forms." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2010-3659/", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2010-3659/" }, { "name": "[oss-security] 20140212 Re: Old CVE ids, public, but still", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/02/12/8" }, { "name": "[oss-security] 20100928 CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/28/8" }, { "name": "42029", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42029" }, { "name": "https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012/", "refsource": "CONFIRM", "url": "https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3659", "datePublished": "2017-10-20T18:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:51.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-3659\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-10-20T18:29:00.197\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 CMS 4.1.x before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4, and 4.4.x before 4.4.1 allow remote authenticated backend users to inject arbitrary web script or HTML via unspecified parameters to the extension manager, or unspecified parameters to unknown backend forms.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) en TYPO3 CMS en versiones 4.1.x anteriores a la 4.1.14, versiones 4.2.x anteriores a la 4.2.13, versiones 4.3.x anteriores a la 4.3.4 y versiones 4.4.x anteriores a la 4.4.1 permite que usuarios remotos backend inyecten scripts web o HTML arbitrarios mediante par\u00e1metros sin especificar en el gestor de extensiones, o par\u00e1metros sin especificar en formularios de backend desconocidos.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC2F89D7-D34C-4ADD-8A9E-34C37122C3C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"161E310F-F2D8-40B3-8390-8C52ACDD0B72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B33D32-4D59-4768-A2C6-9DC7CD30F5E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4679B5DF-25FA-40E9-A322-DF1FF1BC7E7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96D69530-AE74-4012-B522-01D0B6B01662\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5514D17F-95A5-48C5-9F91-554F8D3C3DF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E46E35EC-FF7B-4510-A5F2-FC230B7477B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A671ED2-91AA-4447-8996-A8A16FE753A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4219A367-8431-4A72-AF73-ED2A853B14E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F10D45-FA29-4534-8789-201D194C46B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"878A3B3A-91B6-4EB3-995C-46CEF6FE4343\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51B3DD65-A811-47DD-ADC6-015EE9BC2A04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E06499-FC41-4B7F-B76E-37FA423F17C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6B3184-8868-4604-9E01-3EFBF6608EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93919E9-B3E8-483E-A701-D87570127207\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B1326B-CB9E-4B40-85BD-05AF52E6A1D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDEAF6A-8A99-4872-98CC-12BD54515B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8185B9-D244-43B3-9DF1-FF137A2108DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFAD319-DDFC-499F-86AB-141FBE435F6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E068CC16-6995-40C6-BA24-9CA334C4CABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3B79B49-B4A1-472D-9F6E-BF9ADA3E2EC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26DF36E3-785F-4515-8999-BF48A255907F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F143436A-848B-443F-95E2-B20BC2403CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5B21D3-7955-450F-8357-A37905B963B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC67810-D2C5-4242-ACF2-CF7E9C56D7FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E485652B-FDE0-44C1-83F5-D22B16BEBB34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3A987C0-51DF-464C-8F4D-03C9CAD256EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6066CFA2-202E-43A3-B1DF-36364ABD5A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13C922A9-05A3-4D98-A568-F780CCA87E39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44E9893A-2771-4C04-9F90-B10EE659088E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31DA3600-C955-46B0-8BD9-C9B3FC0B81EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:typo3:typo3:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A60F86FA-B7D3-4BE5-82F2-05F2A5F5663D\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2010/09/28/8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/02/12/8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.securityfocus.com/bid/42029\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2010-3659/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/09/28/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/02/12/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.securityfocus.com/bid/42029\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2010-3659/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…