GEN:SID | 1:2358 |
Message | WEB-PHP Typo3 translations.php file include |
Summary | This event is generated when an attempt is made to exploit a known vulnerability in the PHP web application Typo3.
|
Impact | Execution of arbitrary code on the affected system
|
Detailed Information | Typo3 contains a flaw such that it may be possible for an attacker to include code of their choosing by manipulating the variable ONLY when making a GET or POST request to a vulnerable system.
It may be possible for an attacker to execute that code with the privileges of the user running the webserver, usually root.
|
Affected Systems | Typo3 Typo3 3.5 b5
|
Attack Scenarios | An attacker can make a request to an affected script and define their own path for the ONLY variable.
|
Ease of Attack | Simple. No exploit software required.
|
Corrective Action | Apply the appropriate vendor supplied patches
Upgrade to the latest non-affected version of the software
|
Additional References | |
Rule References | bugtraq: 6984
|