mback2k mh_httpbl Extension har 1.1.7 ka TYPO3 class.tx_mhhttpbl.php stopOutput $_SERVER['REMOTE_ADDR'] Cross Site Scripting

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
4.3$0-$5k0.12

Gundumabayani

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a mback2k mh_httpbl Extension har 1.1.7 on TYPO3. Hakika, aikin stopOutput ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil class.tx_mhhttpbl.php, a cikin sashen $software_component. A sa manipulation of the argument $_SERVER['REMOTE_ADDR'] ka Cross Site Scripting. Wannan matsala ana saninta da CVE-2016-15032. Ngam yiɗi ka a tuma ndiyam ka internet. Babu exploit ɗin da ake samu. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a faggata. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Furɗebayani

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a mback2k mh_httpbl Extension har 1.1.7 on TYPO3. Hakika, aikin stopOutput ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil class.tx_mhhttpbl.php, a cikin sashen $software_component. A sa manipulation of the argument $_SERVER['REMOTE_ADDR'] ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 05/26/2016 kamar a754bf306a433a8c18b55e25595593e8f19b9463. An raba bayanin tsaro don saukewa a github.com.

Wannan matsala ana saninta da CVE-2016-15032. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Shaharar wannan vulnerability ɗin ƙasa da matsakaici ne. Babu exploit ɗin da ake samu. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.

Á sàmbu a wondi feere. 0-day shima, an ndiyam a wuro be $0-$5k.

Ana kiran patch ɗin da a754bf306a433a8c18b55e25595593e8f19b9463. Bugfix ɗin an shirya shi don saukewa a github.com. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a faggata. Wannan shawara ta ƙunshi wannan magana:

Fix possible Cross-Site Scripting by escaping remote addr and host Thanks to Nicole Cordes of the TYPO3 Security Team.

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Kayanbayani

Ngilabe

Sunu

Furɗe

Laisens

Garga

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 4.4
VulDB Meta Temp Score: 4.3

VulDB Ganda Borno: 3.5
VulDB Temp Score: 3.4
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 6.1
NVD Furɗo: 🔍

CNA Ganda Borno: 3.5
CNA Furɗo (VulDB): 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 🔍

Gargajiyabayani

Klasu: Cross Site Scripting
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔍
Halitta: A wondi feere
Google Hack: 🔍

EPSS Score: 🔍
EPSS Percentile: 🔍

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Gargajiya
Halitta: 🔍

Garga waaji: 🔍
0-Day Gana: 🔍
Lokon Gana: 🔍

Gargajiya: mh_httpbl Extension 1.1.8
Kari: a754bf306a433a8c18b55e25595593e8f19b9463

Waktin layibayani

05/26/2016 🔍
05/26/2016 +0 Hənde 🔍
05/31/2023 +2561 Hənde 🔍
05/31/2023 +0 Hənde 🔍
04/26/2025 +696 Hənde 🔍

Ngizimbayani

Gargaaji: a754bf306a433a8c18b55e25595593e8f19b9463
Halitta: Gaskiya

CVE: CVE-2016-15032 (🔍)
GCVE (CVE): GCVE-0-2016-15032
GCVE (VulDB): GCVE-100-230391

Gumtibayani

Súgá: 05/31/2023 18:55
Gargadi: 04/26/2025 04:32
Goyarwa: 05/31/2023 18:55 (49), 06/25/2023 10:36 (2), 06/25/2023 10:42 (28), 06/25/2023 10:47 (1), 08/06/2024 10:14 (21), 04/26/2025 04:32 (4)
Gadankam: 🔍
Cache ID: 253:FA9:103

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Do you want to use VulDB in your project?

Use the official API to access entries easily!