Lucene search

K
githubGitHub Advisory DatabaseGHSA-R9VC-JFMH-6J48
HistoryMay 30, 2024 - 9:04 p.m.

TYPO3 frontend login vulnerable to Session Fixation

2024-05-3021:04:40
CWE-384
GitHub Advisory Database
github.com
7
typo3
frontend
login
session fixation
vulnerability
authentication
session id
attackers
cross-site scripting

AI Score

6.3

Confidence

High

It has been discovered that TYPO3 is susceptible to session fixation. If a user authenticates while anonymous session data is present, the session id is not changed. This makes it possible for attackers to generate a valid session id, trick users into using this session id (e.g. by leveraging a different Cross-Site Scripting vulnerability) and then maybe getting access to an authenticated session.

Affected configurations

Vulners
Node
typo3typo3_cmsRange7.0.07.3.1
OR
typo3typo3_cmsRange6.2.06.2.14
VendorProductVersionCPE
typo3typo3_cms*cpe:2.3:a:typo3:typo3_cms:*:*:*:*:*:*:*:*

AI Score

6.3

Confidence

High