mback2k mh_httpbl Extension har 1.1.7 ka TYPO3 class.tx_mhhttpbl.php stopOutput $_SERVER['REMOTE_ADDR'] Cross Site Scripting
| CVSS Meta Temp Score | Garga na exploit ndiyam (≈) | CTI Nganji Score |
|---|---|---|
| 4.3 | $0-$5k | 0.12 |
Gunduma
Gaskiya vulnerability da aka ware a matsayin karshewa an samu a mback2k mh_httpbl Extension har 1.1.7 on TYPO3. Hakika, aikin stopOutput ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil class.tx_mhhttpbl.php, a cikin sashen $software_component. A sa manipulation of the argument $_SERVER['REMOTE_ADDR'] ka Cross Site Scripting. Wannan matsala ana saninta da CVE-2016-15032. Ngam yiɗi ka a tuma ndiyam ka internet. Babu exploit ɗin da ake samu. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a faggata. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Furɗe
Gaskiya vulnerability da aka ware a matsayin karshewa an samu a mback2k mh_httpbl Extension har 1.1.7 on TYPO3. Hakika, aikin stopOutput ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil class.tx_mhhttpbl.php, a cikin sashen $software_component. A sa manipulation of the argument $_SERVER['REMOTE_ADDR'] ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 05/26/2016 kamar a754bf306a433a8c18b55e25595593e8f19b9463. An raba bayanin tsaro don saukewa a github.com.
Wannan matsala ana saninta da CVE-2016-15032. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Shaharar wannan vulnerability ɗin ƙasa da matsakaici ne. Babu exploit ɗin da ake samu. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.
Á sàmbu a wondi feere. 0-day shima, an ndiyam a wuro be $0-$5k.
Ana kiran patch ɗin da a754bf306a433a8c18b55e25595593e8f19b9463. Bugfix ɗin an shirya shi don saukewa a github.com. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a faggata. Wannan shawara ta ƙunshi wannan magana:
Fix possible Cross-Site Scripting by escaping remote addr and host Thanks to Nicole Cordes of the TYPO3 Security Team.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Kayan
Ngilabe
Sunu
Furɗe
Laisens
Garga
CPE 2.3
CPE 2.2
CVSSv4
VulDB Furɗo: 🔍VulDB Gaskiya: 🔍
CVSSv3
VulDB Meta Base Score: 4.4VulDB Meta Temp Score: 4.3
VulDB Ganda Borno: 3.5
VulDB Temp Score: 3.4
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍
NVD Ganda Borno: 6.1
NVD Furɗo: 🔍
CNA Ganda Borno: 3.5
CNA Furɗo (VulDB): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vektar | Kumpleksiti | Authentisierung | Kariyandi | Gaskiya | Gashina |
|---|---|---|---|---|---|
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍
NVD Ganda Borno: 🔍
Gargajiya
Klasu: Cross Site ScriptingCWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Fizikal: Ayi
Gumti: Ayi
Gana: Ee
Gashina: 🔍
Halitta: A wondi feere
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍
| 0-Day | furu | furu | furu | furu |
|---|---|---|---|---|
| Lale | furu | furu | furu | furu |
Bayani na barazana
Ngam: 🔍Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍
Kari gamji
Garga: GargajiyaHalitta: 🔍
Garga waaji: 🔍
0-Day Gana: 🔍
Lokon Gana: 🔍
Gargajiya: mh_httpbl Extension 1.1.8
Kari: a754bf306a433a8c18b55e25595593e8f19b9463
Waktin layi
05/26/2016 🔍05/26/2016 🔍
05/31/2023 🔍
05/31/2023 🔍
04/26/2025 🔍
Ngizim
Gargaaji: a754bf306a433a8c18b55e25595593e8f19b9463Halitta: Gaskiya
CVE: CVE-2016-15032 (🔍)
GCVE (CVE): GCVE-0-2016-15032
GCVE (VulDB): GCVE-100-230391
Gumti
Súgá: 05/31/2023 18:55Gargadi: 04/26/2025 04:32
Goyarwa: 05/31/2023 18:55 (49), 06/25/2023 10:36 (2), 06/25/2023 10:42 (28), 06/25/2023 10:47 (1), 08/06/2024 10:14 (21), 04/26/2025 04:32 (4)
Gadankam: 🔍
Cache ID: 253:FA9:103
A ga wuroyo kulu. Kàlàmbe: kr + en.
Ngam loga ka, kanyi shidin dum.