CVE-2014-3941
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
03/06/2014
Last modified:
12/04/2025
Description
TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing."
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:typo3:typo3:4.7.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html
- http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/
- http://www.debian.org/security/2014/dsa-2942
- http://www.openwall.com/lists/oss-security/2014/06/03/2
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html
- http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/
- http://www.debian.org/security/2014/dsa-2942
- http://www.openwall.com/lists/oss-security/2014/06/03/2



