{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P><SPAN class=\"textit\">TYPO3</SPAN> versions 4.2.0, 4.2.1 et  4.2.2.</P>","content":"## Description\n\nDes vuln\u00e9rabilit\u00e9s dans les modules file et felogin de TYPO3 permettent\nde r\u00e9aliser des attaques de type cross-site scripting.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[],"reference":"CERTA-2008-AVI-554","revisions":[{"description":"version initiale.","revision_date":"2008-11-13T00:00:00.000000"}],"risks":[{"description":"Injection de code indirecte"}],"summary":"Des vuln\u00e9rabilit\u00e9s dans <span class=\"textit\">TYPO3</span> permettent de\nr\u00e9aliser des attaques de type <span class=\"textit\">cross-site\nscripting</span>.\n","title":"Vuln\u00e9rabilit\u00e9s dans TYPO3","vendor_advisories":[{"published_at":null,"title":"TYPO3-20081113-2 du 13 novembre 2008","url":"http://typo3.org/teams/security/security-bulletins/typo3-20081113-2/"},{"published_at":null,"title":"Bulletins de s\u00e9curit\u00e9 TYPO3 TYPO3-20081113-1 et","url":"http://typo3.org/teams/security/security-bulletins/typo3-20081113-2/"}]}
