fkie_cve-2012-5890
Vulnerability from fkie_nvd
Published
2012-11-17 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Front End User Registration (sr_feuser_register) extension before 2.6.2 for TYPO3 allows remote attackers to obtain user names and passwords via the (1) edit perspective or (2) autologin feature.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19555E75-281D-4248-9A87-51646A9BB52A",
              "versionEndIncluding": "2.6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CAA155D-D1C6-494D-AD8B-ECE5317487ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADF2300-E9A2-4615-B4E0-278ABBE42D44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0EFE2B9-5E08-468D-9EC6-1B9CDACF073C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "697353A3-169E-45FA-96D3-55B68BEBAABA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "585F4ACD-7AC3-40BC-B69B-89AE2FADC258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDB596B-77F5-4D4E-A310-1623C693F8A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7DB7FBD-43DF-423D-B19F-71EB570740D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEB3782-6FDC-4545-B56A-F622C291AEEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "476D5133-8BCB-44BF-B61F-6699D7B8F9A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "78CD10C9-701F-4DD1-8973-AF57188A7AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0018996E-6F56-4BA4-926F-69DF4C9E3029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A096ADF6-0654-4EBB-9438-62641B98161E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C02EFC5-7E83-45FB-B04B-5BAF17FD45B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "926799DE-4DAC-4A2A-A1FF-11A9C35ADBDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA2BBB5-1CF3-482B-A07C-9C10414BC120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "192C448A-62D1-4A8A-AA36-B0D21732A1B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B238304F-2FEB-497C-B74D-4BED29879040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABDA6FBA-9A42-4524-AA65-2A15A5B2E2A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51DBFDB-9D5B-46D2-8EBC-A298E8DBBF88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530EAF4D-1170-402F-83C2-DF4CBBE2D835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC00A773-3560-4177-8496-F6F344A7E4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E487F62-CF2B-4241-A8C0-E24050A3FC0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A65D8D7D-BE4C-4675-B64C-E0BA8611D7EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D50A3F1-6410-45DF-AEB8-7EED53C75392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FABBDF7-3893-4EA2-BDDA-96B2F4D8690E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "75EC3A9F-2BC8-4D2B-919E-1423CC9F32DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BC189-BE6A-454E-8C2E-F0CBD154C45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0952E35D-5261-4CF8-9E89-33B76CC6A588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FF5FCA1-3E4D-45A6-9986-D1F78AC9786E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1476EF27-25D7-45EF-949C-761131D2EA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "546430ED-FA47-4D0D-936F-96369343A341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.17:18:*:*:*:*:*:*",
              "matchCriteriaId": "F429EAA3-46C8-47C0-B88F-3D0AF2759518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stanislas_rolland:sr_feuser_register:2.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C03F06E-72E6-4F4C-A73A-01594B30064D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E66C5ABA-7727-4562-A792-5E450098D520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Front End User Registration (sr_feuser_register) extension before 2.6.2 for TYPO3 allows remote attackers to obtain user names and passwords via the (1) edit perspective or (2) autologin feature."
    },
    {
      "lang": "es",
      "value": "La extensi\u00f3n \u0027Front End User Registration\u0027\r\n(sr_feuser_register) antes de v2.6.2 para TYPO3 permite a atacantes remotos obtener nombres de usuario y contrase\u00f1as a trav\u00e9s de las funcionalidad de (1) editar Perspectivas o (2) inicio de sesi\u00f3n autom\u00e1tico (\u0027autologin\u0027).\r\n"
    }
  ],
  "id": "CVE-2012-5890",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-11-17T21:55:01.970",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://forge.typo3.org/projects/extension-sr_feuser_register/repository/entry/trunk/ChangeLog"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://forge.typo3.org/projects/extension-sr_feuser_register/repository/revisions/58720"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-002/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://forge.typo3.org/projects/extension-sr_feuser_register/repository/entry/trunk/ChangeLog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://forge.typo3.org/projects/extension-sr_feuser_register/repository/revisions/58720"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80145"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…