fkie_cve-2014-3943
Vulnerability from fkie_nvd
Published
2014-06-03 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allow remote authenticated editors to inject arbitrary web script or HTML via unknown parameters.
Impacted products
Vendor Product Version
typo3 typo3 4.5.0
typo3 typo3 4.5.1
typo3 typo3 4.5.2
typo3 typo3 4.5.3
typo3 typo3 4.5.4
typo3 typo3 4.5.5
typo3 typo3 4.5.6
typo3 typo3 4.5.7
typo3 typo3 4.5.8
typo3 typo3 4.5.9
typo3 typo3 4.5.10
typo3 typo3 4.5.11
typo3 typo3 4.5.12
typo3 typo3 4.5.13
typo3 typo3 4.5.14
typo3 typo3 4.5.15
typo3 typo3 4.5.16
typo3 typo3 4.5.17
typo3 typo3 4.5.18
typo3 typo3 4.5.19
typo3 typo3 4.5.20
typo3 typo3 4.5.21
typo3 typo3 4.5.22
typo3 typo3 4.5.23
typo3 typo3 4.5.24
typo3 typo3 4.5.25
typo3 typo3 4.5.26
typo3 typo3 4.5.27
typo3 typo3 4.5.28
typo3 typo3 4.5.29
typo3 typo3 4.5.30
typo3 typo3 4.5.31
typo3 typo3 4.5.32
typo3 typo3 4.5.33
typo3 typo3 6.0
typo3 typo3 6.0.1
typo3 typo3 6.0.2
typo3 typo3 6.0.3
typo3 typo3 6.0.4
typo3 typo3 6.0.5
typo3 typo3 6.0.6
typo3 typo3 6.0.7
typo3 typo3 6.0.8
typo3 typo3 6.0.9
typo3 typo3 6.0.10
typo3 typo3 6.0.11
typo3 typo3 6.0.12
typo3 typo3 6.0.13
typo3 typo3 6.2
typo3 typo3 6.2.0
typo3 typo3 6.2.0
typo3 typo3 6.2.0
typo3 typo3 6.2.1
typo3 typo3 6.2.2
typo3 typo3 6.1
typo3 typo3 6.1.1
typo3 typo3 6.1.2
typo3 typo3 6.1.3
typo3 typo3 6.1.4
typo3 typo3 6.1.5
typo3 typo3 6.1.6
typo3 typo3 6.1.7
typo3 typo3 6.1.8
typo3 typo3 4.7.0
typo3 typo3 4.7.1
typo3 typo3 4.7.2
typo3 typo3 4.7.3
typo3 typo3 4.7.4
typo3 typo3 4.7.5
typo3 typo3 4.7.6
typo3 typo3 4.7.7
typo3 typo3 4.7.8
typo3 typo3 4.7.9
typo3 typo3 4.7.10
typo3 typo3 4.7.11
typo3 typo3 4.7.12
typo3 typo3 4.7.13
typo3 typo3 4.7.14
typo3 typo3 4.7.15
typo3 typo3 4.7.16
typo3 typo3 4.7.17
typo3 typo3 4.7.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6523E669-DD41-4A28-A4D4-83CC8BE0143B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "868534F5-9CEE-48F8-BD2F-EDD8F9F5D302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD9A9F1-28EA-4B39-9D2D-74E7F86B1355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2B855F-5281-4DE6-A3C2-F579FDE5FD60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F773E8B-F81C-4A04-8A78-0576CB899A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2B48937-411B-468D-B35C-73BA0DCE7A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "867200CE-C689-4E6F-9D56-565B6D841494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EDD9F0-BBE2-4A79-B1A1-6CD31939A5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAEAFB6-4FA3-4586-A7D6-ED269433220A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDAE81E-15AD-4C1D-8989-9EFA6445885F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D451E97C-061F-43D3-B3B3-FD46C694C934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E8DF53F-3E5A-485E-8430-348207EBFF81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC68F0F3-89BC-4398-95EE-6358094B284B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "28352CAB-EF6C-43DC-9487-202151B18612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "635C90E5-BBCE-4662-BC16-4F04FCE04785",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "32D324F6-E73B-4F54-A4B1-431550C08341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AC3681-104E-4A33-B9F7-F648DB4B8193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE92575-D6F5-4304-8347-19E75EA35331",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F1954F5-A6EF-4A95-976E-5295197EEB2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "71834B10-8897-466C-9B2E-21FC04400540",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB69F7E9-001D-42B3-BEB4-B294737AD27B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E8530B-0311-45AA-92B4-6FF2CE388E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53B9001-C5B4-4D19-A314-118E3A292346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "E663FE0B-B509-4427-A2A0-9EB53E26810F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FA36C35-E9BD-4ED2-B6CB-950D641678E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A54839-425D-4D28-8AD2-479A593474FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "83542527-9738-46C0-A4D2-D5E2E203CD49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B68AE9-081A-4BE0-A2AF-969216D26637",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "253A3E84-401E-4F9F-8A9A-B8C464C69929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "08742759-FFC8-4908-B319-4EC279C6AB74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC4B4B3F-D7BE-493C-ABF6-416FF89C4A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "36748261-81EF-4E39-8EC5-A67F054B623F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "21CC1BD2-CB44-4C0F-8B87-6272AEEBDEAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7129E4A-834D-4405-853B-89F1BD7965E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84C095F8-000A-4A8D-81DE-047810345A15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "976AAF6F-BF03-40B7-B7D2-22101BD857D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E98D0D9-D9AE-44F7-8233-F92EB330B152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "36EA784A-7C3A-41DA-B444-D01E3BC144BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7294AA8B-0CD3-47A2-91DC-A882F7F3BDFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D28DD85-FBB3-4DD4-B525-7AFD32BE55F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C21E07-5083-4C86-AA9D-FCB73F636060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DAE1BB4-2DBD-489E-B3F9-88CF414EAC2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0724FE19-F0A4-4055-996A-2B7844CAC426",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A862C28E-B1B9-4541-A559-D0BD16E575B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1DE94A-DDCD-4067-A0C0-16904F6B7EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C6DD4A1-C865-4AC8-86BC-8F92319F33A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E7ACA06-C0C1-4EEA-A629-C453C97660A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C444E62-897D-4C7A-AEC6-C5728166A11A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7715060-1441-4CF9-BEDF-91D28FE31ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "7183456A-52B4-4386-8979-A2ECEA9959FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "16EEC79F-3293-451C-864E-9CE020F6C730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "8FD27EAD-04D5-4C55-952E-020954B90CEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "99262E73-E4A7-4657-A32E-3C289C052675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E230A800-B2DE-4ED4-9C6B-961832C39900",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C140F242-CF7C-4CB6-A358-5C8DB0F26DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EAC0BA-B6AC-42BA-AEEE-946E1FBD770B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD31180A-8BD6-49AC-A758-5FA4C9A7B4C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E06A3B0C-364F-42A3-803B-6CE1EAB386C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "692DE690-C921-403B-9966-60CB23FF5D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "94C181FE-F3A9-4C7E-955F-0CCD4E6B4DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "11DD1626-884F-40EE-9721-2FCF7F14F781",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFFF68DC-AFBB-4055-83AF-BAFE9C68FBC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:6.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0F0FB1F-45D1-49A8-8882-393B16E6AA34",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "36FFBD83-F3FE-4913-8578-98F27E39A73C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3AA3E69-C22E-463C-837F-42EE6B59E350",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "082BD28F-5FEE-4D25-98CF-27513DBF0E39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F5F3DD-55D7-4028-A228-2A737A51FDE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F89DD9F-019A-4AD3-AD0E-4F20F1AF5C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "684500C9-8532-45C4-8F29-33AAC3DDA3AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F830A8F-C51C-4CED-BCA2-845C312087FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C537426-82DB-426B-BB95-CC119C20266A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D3AE18-7B26-4448-AF98-0D2692C80BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AD3ED8-5107-418D-8F0F-6B07845D3C74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2FEFD3C-A4CC-4FCC-8ECD-3EE1E69DE58D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1EE4B6-9256-494E-A11B-9700F0376AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D0A8566-4A01-4948-A237-3CED2D065FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5459D18-7283-4650-9304-7F576AB1D779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B404C733-4F5C-4EB2-B4B9-F25A95BB6E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BDE85A-5F76-4249-9B38-B3A1649F777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6357ACD4-E404-489A-B218-1CED134F4893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6650206-8DD5-4D05-BBD2-15A12842117B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D9712BC-E1C2-46AF-8111-DE5523DFF3DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allow remote authenticated editors to inject arbitrary web script or HTML via unknown parameters."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de XSS en componentes de motor (backend) no especificados en TYPO3 4.5.0 anterior a 4.5.34, 4.7.0 anterior a 4.7.19, 6.0.0 anterior a 6.0.14, 6.1.0 anterior a 6.1.9 y 6.2.0 anterior a 6.2.3 permiten a editores remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de par\u00e1metros desconocidos."
    }
  ],
  "id": "CVE-2014-3943",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-06-03T14:55:11.067",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2014/dsa-2942"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/67625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2942"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/67625"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…