The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2009/02/10/6 | mailing list |
http://www.debian.org/security/2009/dsa-1720 | patch vendor advisory |
http://www.securitytracker.com/id?1021710 | vdb entry |
http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/ | patch vendor advisory |