Lucene search

K
cve[email protected]CVE-2022-36106
HistorySep 13, 2022 - 6:15 p.m.

CVE-2022-36106

2022-09-1318:15:15
CWE-287
web.nvd.nist.gov
35
4
typo3
password reset
expiration
security vulnerability
cve-2022-36106

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

5.5 Medium

AI Score

Confidence

High

TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the expiration time of a password reset link for TYPO3 backend users has never been evaluated. As a result, a password reset link could be used to perform a password reset even if the default expiry time of two hours has been exceeded. Update to TYPO3 version 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue.

CPE configuration

Vulners
NVD
typo3typo3Range10.4.010.4.32
OR
typo3typo3Range11.0.011.5.16
VendorProductVersionCPE
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
typo3typo3*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "typo3",
    "vendor": "TYPO3",
    "versions": [
      {
        "status": "affected",
        "version": ">= 10.4.0, < 10.4.32"
      },
      {
        "status": "affected",
        "version": ">= 11.0.0, < 11.5.16"
      }
    ]
  }
]

Social References

More

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

5.5 Medium

AI Score

Confidence

High