Vulnerability Details : CVE-2012-3527
view_help.php in the backend help system in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote authenticated backend users to unserialize arbitrary objects and possibly execute arbitrary PHP code via an unspecified parameter, related to a "missing signature (HMAC)."
Exploit prediction scoring system (EPSS) score for CVE-2012-3527
Probability of exploitation activity in the next 30 days: 0.27%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 65 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-3527
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:N/AC:H/Au:S/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
CWE ids for CVE-2012-3527
-
Assigned by: nvd@nist.gov (Primary)
-
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3527
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/77791
Typo3 view_help.php code execution CVE-2012-3527 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://secunia.com/advisories/50287
Sign inNot Applicable
-
http://osvdb.org/84773
Broken Link
-
http://www.openwall.com/lists/oss-security/2012/08/22/8
oss-security - Re: CVE request: Typo3Mailing List
-
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/
Several Vulnerabilities in TYPO3 CoreVendor Advisory
-
http://www.debian.org/security/2012/dsa-2537
Debian -- Security Information -- DSA-2537-1 typo3-srcThird Party Advisory
Products affected by CVE-2012-3527
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*