PHP remote file inclusion vulnerability in the autoloader in TYPO3 4.3.x before 4.3.3 allows remote attackers to execute arbitrary PHP code via a URL in an input field associated with the className variable.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-008/ | vendor advisory |
http://marc.info/?l=oss-security&m=127092306209177&w=2 | mailing list |
http://www.openwall.com/lists/oss-security/2010/04/12/1 | mailing list |