Lucene search

K
githubGitHub Advisory DatabaseGHSA-RXC9-F2X6-QH4W
HistoryMay 30, 2024 - 3:39 p.m.

TYPO3 Security Misconfiguration for Backend User Accounts

2024-05-3015:39:01
CWE-287
GitHub Advisory Database
github.com
4
typo3
security
misconfiguration
backend
user accounts
database
credentials
vulnerability
authentication.

7.3 High

AI Score

Confidence

Low

When using the TYPO3 backend in order to create new backend user accounts, database records containing insecure or empty credentials might be persisted. When the type of user account is changed - which might be entity type or the admin flag for backend users - the backend form is reloaded in order to reflect changed configuration possibilities. However, this leads to persisting the current state as well, which can result into some of the following:

  • account contains empty login credentials (username and/or password)
  • account is incomplete and contains weak credentials (username and/or password)

Albeit the functionality provided by the TYPO3 core cannot be used either with empty usernames or empty passwords, it still can be a severe vulnerability to custom authentication service implementations.

This weakness cannot be directly exploited and requires interaction on purpose by some backend user having according privileges.

Affected configurations

Vulners
Node
typo3cms_poll_system_extensionRange<9.5.4
OR
typo3cms_poll_system_extensionRange<8.7.23
CPENameOperatorVersion
typo3/cms-corelt9.5.4
typo3/cms-corelt8.7.23

7.3 High

AI Score

Confidence

Low