Search for vulnerabilities
Vulnerability details: VCID-au4n-kuzg-h3es
Vulnerability ID VCID-au4n-kuzg-h3es
Aliases CVE-2009-0815
GHSA-c22j-84c7-cm77
Summary TYPO3 leaks a hash secret in an error message The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (4)
Data source Metasploit
Description This module exploits a file disclosure vulnerability in the jumpUrl mechanism of Typo3. This flaw can be used to read any file that the web server user account has access to.
Note
Stability:
  - crash-safe
SideEffects:
  - ioc-in-logs
Reliability: []
Ransomware campaign use Unknown
Source publication date Feb. 10, 2009
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/admin/http/typo3_sa_2009_002.rb
Exploit Prediction Scoring System (EPSS)
Percentile 0.97665
EPSS Score 0.498
Published At June 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-01T12:27:19.688238+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-c22j-84c7-cm77/GHSA-c22j-84c7-cm77.json 36.1.3