{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2012-08-15T00:00:00.000Z","descriptions":[{"lang":"en","value":"view_help.php in the backend help system in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote authenticated backend users to unserialize arbitrary objects and possibly execute arbitrary PHP code via an unspecified parameter, related to a \"missing signature (HMAC).\""}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-28T12:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/"},{"name":"DSA-2537","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2012/dsa-2537"},{"name":"[oss-security] 20120822 Re: CVE request: Typo3","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2012/08/22/8"},{"name":"typo3-viewhelp-code-exec(77791)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77791"},{"name":"84773","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/84773"},{"name":"50287","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/50287"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2012-3527","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"view_help.php in the backend help system in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote authenticated backend users to unserialize arbitrary objects and possibly execute arbitrary PHP code via an unspecified parameter, related to a \"missing signature (HMAC).\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/","refsource":"CONFIRM","url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/"},{"name":"DSA-2537","refsource":"DEBIAN","url":"http://www.debian.org/security/2012/dsa-2537"},{"name":"[oss-security] 20120822 Re: CVE request: Typo3","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2012/08/22/8"},{"name":"typo3-viewhelp-code-exec(77791)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77791"},{"name":"84773","refsource":"OSVDB","url":"http://osvdb.org/84773"},{"name":"50287","refsource":"SECUNIA","url":"http://secunia.com/advisories/50287"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T20:05:12.679Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/"},{"name":"DSA-2537","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2012/dsa-2537"},{"name":"[oss-security] 20120822 Re: CVE request: Typo3","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2012/08/22/8"},{"name":"typo3-viewhelp-code-exec(77791)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77791"},{"name":"84773","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/84773"},{"name":"50287","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/50287"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2012-3527","datePublished":"2012-09-05T23:00:00.000Z","dateReserved":"2012-06-14T00:00:00.000Z","dateUpdated":"2024-08-06T20:05:12.679Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}