{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"TYPO3 versions 4.2.0 \u00e0 4.2.17 ;","product":{"name":"Typo3","vendor":{"name":"Typo3","scada":false}}},{"description":"TYPO3 versions 4.4.0 \u00e0 4.4.10 ;","product":{"name":"Typo3","vendor":{"name":"Typo3","scada":false}}},{"description":"TYPO3 versions 4.3.0 \u00e0 4.3.13 ;","product":{"name":"Typo3","vendor":{"name":"Typo3","scada":false}}},{"description":"TYPO3 versions 4.5.0 \u00e0 4.5.5.","product":{"name":"Typo3","vendor":{"name":"Typo3","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nDes vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans TYPO3 :\n\n-   les valeurs des param\u00e8tres ne sont pas correctement remplac\u00e9es, ce\n    qui rend possible une injection SQL (versions 4.5 uniquement) ;\n-   dans certaines configurations, il est possible de remplir les tables\n    de cache de TYPO3.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[],"reference":"CERTA-2011-AVI-662","revisions":[{"description":"version initiale.","revision_date":"2011-11-22T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection SQL"}],"summary":"Des vuln\u00e9rabilit\u00e9s dans <span class=\"textit\">TYPO3</span> permettent de\nr\u00e9aliser un d\u00e9ni de service \u00e0 distance et \u00e9ventuellement une injection\nSQL.\n","title":"Vuln\u00e9rabilit\u00e9s dans TYPO3","vendor_advisories":[{"published_at":null,"title":"Bulletins de s\u00e9curit\u00e9 TYPO3 du 14 septembre 2011","url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2011-003/"}]}
