Job Fair Extension up to 1.0.0 on TYPO3 File Upload unrestricted upload
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.0 | $0-$5k | 0.00 |
Summary
A vulnerability categorized as critical has been discovered in Job Fair Extension up to 1.0.0 on TYPO3. This vulnerability affects unknown code of the component File Upload. Executing a manipulation can lead to unrestricted upload. This vulnerability appears as CVE-2015-4606. There is no available exploit. It is advisable to upgrade the affected component.
Details
A vulnerability was found in Job Fair Extension up to 1.0.0 on TYPO3. It has been declared as critical. This vulnerability affects an unknown functionality of the component File Upload. The manipulation with an unknown input leads to a unrestricted upload vulnerability. The CWE definition for the vulnerability is CWE-434. The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Unrestricted file upload vulnerability in the Job Fair (jobfair) extension before 1.0.1 for TYPO3, when using Apache with mod_mime, allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the extension upload folder.
The weakness was presented 06/16/2015 (Website). The advisory is available at typo3.org. This vulnerability was named CVE-2015-4606 since 06/16/2015. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1608.002 by the MITRE ATT&CK project.
Upgrading to version 1.0.1 eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 75238†). Once again VulDB remains the best source for vulnerability data.
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.0
VulDB Base Score: 7.3
VulDB Temp Score: 7.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Unrestricted uploadCWE: CWE-434 / CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Job Fair Extension 1.0.1
Timeline
06/15/2015 🔍06/16/2015 🔍
06/16/2015 🔍
06/16/2015 🔍
06/17/2015 🔍
04/08/2019 🔍
Sources
Advisory: typo3.orgStatus: Not defined
Confirmation: 🔍
CVE: CVE-2015-4606 (🔍)
GCVE (CVE): GCVE-0-2015-4606
GCVE (VulDB): GCVE-100-75958
SecurityFocus: 75238 - TYPO3 Job Fair Extension CVE-2015-4606 Arbitrary File Upload Vulnerability
Entry
Created: 06/17/2015 12:36Updated: 04/08/2019 22:18
Changes: 06/17/2015 12:36 (49), 04/08/2019 22:18 (4)
Complete: 🔍
Cache ID: 216:396:103
No comments yet. Languages: en.
Please log in to comment.