The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 01:00
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/ - Patch, Vendor Advisory | |
| References | () http://www.debian.org/security/2009/dsa-1720 - Patch | |
| References | () http://www.openwall.com/lists/oss-security/2009/02/10/6 - | |
| References | () http://www.securitytracker.com/id?1021710 - | 
Information
                Published : 2009-03-05 02:30
Updated : 2025-04-09 00:30
NVD link : CVE-2009-0815
Mitre link : CVE-2009-0815
CVE.ORG link : CVE-2009-0815
JSON object : View
Products Affected
                typo3
- typo3
 
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
