5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
25.1%
> ### Meta
> * CVSS: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:F/RL:O/RC:C
(5.0)
It has been discovered that the expiration time of a password reset link for TYPO3 backend users has never been evaluated. As a result, a password reset link could be used to perform a password reset even if the default expiry time of two hours has been exceeded.
Update to TYPO3 version 10.4.32 or 11.5.16 that fix the problem described above.
Thanks to Ingo Fabbri who reported this issue and to TYPO3 security team member Torben Hansen who fixed the issue.
CPE | Name | Operator | Version |
---|---|---|---|
typo3/cms | lt | 11.5.16 | |
typo3/cms | lt | 10.4.32 | |
typo3/cms-core | lt | 11.5.16 | |
typo3/cms-core | lt | 10.4.32 |
github.com/advisories/GHSA-5959-4x58-r8c2
github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-36106.yaml
github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-36106.yaml
github.com/TYPO3/typo3/commit/00b52a443b21baaaab35f8606dbb0ce427261bb5
github.com/TYPO3/typo3/commit/56af2bd3a432156c30af9be71c9d6f7ef3a6159a
github.com/TYPO3/typo3/security/advisories/GHSA-5959-4x58-r8c2
nvd.nist.gov/vuln/detail/CVE-2022-36106
typo3.org/security/advisory/typo3-core-sa-2022-008