Moderate severityNVD Advisory· Published Jan 4, 2015· Updated May 6, 2026
CVE-2014-9508
CVE-2014-9508
Description
The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set and using a homepage with links that only contain anchors, allows remote attackers to change URLs to arbitrary domains for those links via unknown vectors.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
typo3/cmsPackagist | >= 4.5.0, < 4.5.39 | 4.5.39 |
typo3/cmsPackagist | >= 4.6.0, < 6.2.9 | 6.2.9 |
typo3/cmsPackagist | >= 7.0.0, < 7.0.2 | 7.0.2 |
Affected products
118cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*+ 117 more
- cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.22:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.23:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.24:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.25:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.26:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.27:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.28:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.29:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.30:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.31:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.32:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.33:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.34:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.35:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.36:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.37:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.38:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.11:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.12:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.13:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.14:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.15:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.16:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.17:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.18:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.19:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.20:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:6.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:7.0.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/nvdExploitVendor Advisory
- github.com/advisories/GHSA-v6xv-rmqc-wcc8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-9508ghsaADVISORY
- lists.opensuse.org/opensuse-updates/2016-08/msg00106.htmlnvdWEB
- typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003ghsaWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2014-9508.yamlghsaWEB
- typo3.org/security/advisory/typo3-core-sa-2014-003ghsaWEB
News mentions
0No linked articles in our index yet.