fkie_cve-2012-3530
Vulnerability from fkie_nvd
Published
2012-09-05 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Incomplete blacklist vulnerability in the t3lib_div::quoteJSvalue API function in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote attackers to conduct cross-site scripting (XSS) attacks via certain HTML5 JavaScript events.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
typo3 | typo3 | 4.5 | |
typo3 | typo3 | 4.5.0 | |
typo3 | typo3 | 4.5.1 | |
typo3 | typo3 | 4.5.2 | |
typo3 | typo3 | 4.5.3 | |
typo3 | typo3 | 4.5.4 | |
typo3 | typo3 | 4.5.5 | |
typo3 | typo3 | 4.5.6 | |
typo3 | typo3 | 4.5.7 | |
typo3 | typo3 | 4.5.8 | |
typo3 | typo3 | 4.5.9 | |
typo3 | typo3 | 4.5.10 | |
typo3 | typo3 | 4.5.11 | |
typo3 | typo3 | 4.5.12 | |
typo3 | typo3 | 4.5.13 | |
typo3 | typo3 | 4.5.14 | |
typo3 | typo3 | 4.5.15 | |
typo3 | typo3 | 4.5.16 | |
typo3 | typo3 | 4.5.17 | |
typo3 | typo3 | 4.5.18 | |
typo3 | typo3 | 4.6 | |
typo3 | typo3 | 4.6.0 | |
typo3 | typo3 | 4.6.1 | |
typo3 | typo3 | 4.6.2 | |
typo3 | typo3 | 4.6.3 | |
typo3 | typo3 | 4.6.4 | |
typo3 | typo3 | 4.6.5 | |
typo3 | typo3 | 4.6.6 | |
typo3 | typo3 | 4.6.7 | |
typo3 | typo3 | 4.6.8 | |
typo3 | typo3 | 4.6.9 | |
typo3 | typo3 | 4.6.10 | |
typo3 | typo3 | 4.6.11 | |
typo3 | typo3 | 4.7 | |
typo3 | typo3 | 4.7.0 | |
typo3 | typo3 | 4.7.1 | |
typo3 | typo3 | 4.7.2 | |
typo3 | typo3 | 4.7.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typo3:typo3:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "9788D5CD-FEAA-4D07-8252-4176AD0BC0C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "6523E669-DD41-4A28-A4D4-83CC8BE0143B", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "868534F5-9CEE-48F8-BD2F-EDD8F9F5D302", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "3AD9A9F1-28EA-4B39-9D2D-74E7F86B1355", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4D2B855F-5281-4DE6-A3C2-F579FDE5FD60", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F773E8B-F81C-4A04-8A78-0576CB899A43", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "D2B48937-411B-468D-B35C-73BA0DCE7A03", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "867200CE-C689-4E6F-9D56-565B6D841494", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3EDD9F0-BBE2-4A79-B1A1-6CD31939A5EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "1AAEAFB6-4FA3-4586-A7D6-ED269433220A", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "FDDAE81E-15AD-4C1D-8989-9EFA6445885F", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "D451E97C-061F-43D3-B3B3-FD46C694C934", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "5E8DF53F-3E5A-485E-8430-348207EBFF81", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "BC68F0F3-89BC-4398-95EE-6358094B284B", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "28352CAB-EF6C-43DC-9487-202151B18612", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "635C90E5-BBCE-4662-BC16-4F04FCE04785", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "32D324F6-E73B-4F54-A4B1-431550C08341", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "96AC3681-104E-4A33-B9F7-F648DB4B8193", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "8FE92575-D6F5-4304-8347-19E75EA35331", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "9F1954F5-A6EF-4A95-976E-5295197EEB2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "4D42D56A-2A1D-4FAA-961D-304E916BEF80", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "88CBAAC7-5207-45E8-86D5-18D98259070D", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "5FAAF258-882A-46AE-B32C-7569A79C1DAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFB6F1E7-351D-45E7-9571-2AF4283080DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2B3B4A9-BDC7-4426-98FB-398B63AF3D18", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "0016A078-1291-4281-BA62-5A846AEE7584", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "F11DB8A8-8309-4FC9-BA35-1AFFC5B4AE8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "9661D2DB-F24C-478B-B691-303D48D9B158", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F1FD6B9-7FAC-4508-962A-99AF63EB4B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "14369AD5-2622-4530-BCD5-A95C032CE4CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7CBAD29-18E9-4097-88FA-4D287A9A877A", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "9F5144AE-E076-48B5-9EA3-2F0BEC34D92F", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "46246047-B415-437A-AC0E-2A7157D47C17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typo3:typo3:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "0F1A90BF-E780-4282-BCCB-0E568EB785A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "36FFBD83-F3FE-4913-8578-98F27E39A73C", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A3AA3E69-C22E-463C-837F-42EE6B59E350", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "082BD28F-5FEE-4D25-98CF-27513DBF0E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "86F5F3DD-55D7-4028-A228-2A737A51FDE1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in the t3lib_div::quoteJSvalue API function in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote attackers to conduct cross-site scripting (XSS) attacks via certain HTML5 JavaScript events." }, { "lang": "es", "value": "Vulnerabilidad de lista negra incompleta en la funci\u00f3n t3lib_div::quoteJSvalue en TYPO3 v4.5.x anterior a v4.5.19, 4.6.x anterior a v4.6.12 y v4.7.x anterior a v4.7.4 permite a atacantes remotos llevar a cabo ataques de ejecuci\u00f3n de secuencias de comandos en sitios cruzados a trav\u00e9s de ciertos eventos de JavaScript HTML5." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\r\n\r\n\u0027CWE-184: Incomplete Blacklist\u0027", "id": "CVE-2012-3530", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-09-05T23:55:02.177", "references": [ { "source": "secalert@redhat.com", "url": "http://osvdb.org/84772" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50287" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2537" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/08/22/8" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/84772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/08/22/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77794" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…