Lucene search

K
githubGitHub Advisory DatabaseGHSA-CGR9-H9QQ-X9FX
HistoryMay 02, 2022 - 6:18 a.m.

TYPO3 Authentication Bypass via Salted user password hashes extension

2022-05-0206:18:14
CWE-287
GitHub Advisory Database
github.com
3

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

74.8%

Withdrawn: typo3/cms-saltedpasswords is not the correct package.
See: https://github.com/github/advisory-database/pull/3488

The TYPO3 Security - Salted user password hashes (t3sec_saltedpw) extension before 0.2.13 for TYPO3 allows remote attackers to bypass authentication via unspecified vectors.

Affected configurations

Vulners
Node
typo3cms_poll_system_extensionRange<0.2.13
CPENameOperatorVersion
typo3/cms-saltedpasswordslt0.2.13

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

74.8%

Related for GHSA-CGR9-H9QQ-X9FX