Lucene search

K
githubGitHub Advisory DatabaseGHSA-5959-4X58-R8C2
HistorySep 16, 2022 - 5:16 p.m.

TYPO3 CMS missing check for expiration time of password reset token for backend users

2022-09-1617:16:11
CWE-287
GitHub Advisory Database
github.com
24
typo3
backend
password reset
expiration time

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

25.1%

> ### Meta
> * CVSS: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:F/RL:O/RC:C (5.0)

Problem

It has been discovered that the expiration time of a password reset link for TYPO3 backend users has never been evaluated. As a result, a password reset link could be used to perform a password reset even if the default expiry time of two hours has been exceeded.

Solution

Update to TYPO3 version 10.4.32 or 11.5.16 that fix the problem described above.

Credits

Thanks to Ingo Fabbri who reported this issue and to TYPO3 security team member Torben Hansen who fixed the issue.

References

Affected configurations

Vulners
Node
typo3cms_poll_system_extensionRange<11.5.16
OR
typo3cms_poll_system_extensionRange<10.4.32
OR
typo3cms_poll_system_extensionRange<11.5.16
OR
typo3cms_poll_system_extensionRange<10.4.32

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

25.1%