FreeBSD : typo -- XSS (67516177-88ec-11e1-9a10-0023ae8e59f0)

medium Nessus Plugin ID 58790

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Typo Security Team reports :

Failing to properly encode the output, the default TYPO3 Exception Handler is susceptible to Cross-Site Scripting. We are not aware of a possibility to exploit this vulnerability without third party extensions being installed that put user input in exception messages.
However, it has come to our attention that extensions using the extbase MVC framework can be used to exploit this vulnerability if these extensions accept objects in controller actions.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?2972084c

http://www.nessus.org/u?77bec4a4

Plugin Details

Severity: Medium

ID: 58790

File Name: freebsd_pkg_6751617788ec11e19a100023ae8e59f0.nasl

Version: 1.8

Type: local

Published: 4/19/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:typo3, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/18/2012

Vulnerability Publication Date: 4/17/2012

Reference Information

CVE: CVE-2012-2112