Lucene search

K
githubGitHub Advisory DatabaseGHSA-MGJ2-Q8WP-29RR
HistoryDec 13, 2022 - 5:06 p.m.

TYPO3 CMS vulnerable to Insufficient Session Expiration after Password Reset

2022-12-1317:06:07
CWE-613
GitHub Advisory Database
github.com
20
typo3
cms
session expiration
password reset
security advisory

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

21.4%

Problem

When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions.

Solution

Update to TYPO3 versions 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.

References

Affected configurations

Vulners
Node
typo3typo3_cmsRange12.0.012.1.1
OR
typo3typo3_cmsRange11.0.011.5.20
OR
typo3typo3_cmsRange10.0.010.4.33
OR
typo3cms-coreRange12.0.012.1.1
OR
typo3cms-coreRange11.0.011.5.20
OR
typo3cms-coreRange10.0.010.4.33
VendorProductVersionCPE
typo3typo3_cms*cpe:2.3:a:typo3:typo3_cms:*:*:*:*:*:*:*:*
typo3cms-core*cpe:2.3:a:typo3:cms-core:*:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

21.4%