Lucene search

K
cve[email protected]CVE-2015-2047
HistoryFeb 23, 2015 - 5:59 p.m.

CVE-2015-2047

2015-02-2317:59:03
CWE-287
web.nvd.nist.gov
29
typo3
rsaauth
extension
authentication bypass
cve-2015-2047
nvd

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

7 High

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

79.7%

The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.

Affected configurations

NVD
Node
typo3typo3Match4.3.0
OR
typo3typo3Match4.3.1
OR
typo3typo3Match4.3.2
OR
typo3typo3Match4.3.3
OR
typo3typo3Match4.3.4
OR
typo3typo3Match4.3.5
OR
typo3typo3Match4.3.6
OR
typo3typo3Match4.3.7
OR
typo3typo3Match4.3.8
OR
typo3typo3Match4.3.9
OR
typo3typo3Match4.3.10
OR
typo3typo3Match4.3.11
OR
typo3typo3Match4.3.12
OR
typo3typo3Match4.3.13
OR
typo3typo3Match4.3.14
OR
typo3typo3Match4.4.0
OR
typo3typo3Match4.4.1
OR
typo3typo3Match4.4.2
OR
typo3typo3Match4.4.3
OR
typo3typo3Match4.4.4
OR
typo3typo3Match4.4.5
OR
typo3typo3Match4.4.6
OR
typo3typo3Match4.4.7
OR
typo3typo3Match4.4.8
OR
typo3typo3Match4.4.9
OR
typo3typo3Match4.4.10
OR
typo3typo3Match4.4.11
OR
typo3typo3Match4.4.12
OR
typo3typo3Match4.4.13
OR
typo3typo3Match4.4.14
OR
typo3typo3Match4.4.15
OR
typo3typo3Match4.5.0
OR
typo3typo3Match4.5.1
OR
typo3typo3Match4.5.2
OR
typo3typo3Match4.5.3
OR
typo3typo3Match4.5.4
OR
typo3typo3Match4.5.5
OR
typo3typo3Match4.5.6
OR
typo3typo3Match4.5.7
OR
typo3typo3Match4.5.8
OR
typo3typo3Match4.5.9
OR
typo3typo3Match4.5.10
OR
typo3typo3Match4.5.11
OR
typo3typo3Match4.5.12
OR
typo3typo3Match4.5.13
OR
typo3typo3Match4.5.14
OR
typo3typo3Match4.5.15
OR
typo3typo3Match4.5.16
OR
typo3typo3Match4.5.17
OR
typo3typo3Match4.5.18
OR
typo3typo3Match4.5.19
OR
typo3typo3Match4.5.20
OR
typo3typo3Match4.5.21
OR
typo3typo3Match4.5.22
OR
typo3typo3Match4.5.23
OR
typo3typo3Match4.5.24
OR
typo3typo3Match4.5.25
OR
typo3typo3Match4.5.26
OR
typo3typo3Match4.5.27
OR
typo3typo3Match4.5.28
OR
typo3typo3Match4.5.29
OR
typo3typo3Match4.5.30
OR
typo3typo3Match4.5.31
OR
typo3typo3Match4.5.32
OR
typo3typo3Match4.5.33
OR
typo3typo3Match4.5.34
OR
typo3typo3Match4.5.35
OR
typo3typo3Match4.5.36
OR
typo3typo3Match4.5.37
OR
typo3typo3Match4.5.38
OR
typo3typo3Match4.5.39
OR
typo3typo3Match4.6
OR
typo3typo3Match4.6.0
OR
typo3typo3Match4.6.1
OR
typo3typo3Match4.6.2
OR
typo3typo3Match4.6.3
OR
typo3typo3Match4.6.4
OR
typo3typo3Match4.6.5
OR
typo3typo3Match4.6.6
OR
typo3typo3Match4.6.7
OR
typo3typo3Match4.6.8
OR
typo3typo3Match4.6.9
OR
typo3typo3Match4.6.10
OR
typo3typo3Match4.6.11
OR
typo3typo3Match4.6.12
OR
typo3typo3Match4.6.13
OR
typo3typo3Match4.6.14
OR
typo3typo3Match4.6.15
OR
typo3typo3Match4.6.16
OR
typo3typo3Match4.6.17
OR
typo3typo3Match4.6.18
Node
debiandebian_linuxMatch7.0

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

7 High

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

79.7%