5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
6.9 Medium
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
20.3%
> ### CVSS: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N/E:X/RL:O/RC:C
(4.0)
Given that there are at least two different sites in the same TYPO3 installation - for instance first.example.org and second.example.com - then a session cookie generated for the first site can be reused on the second site without requiring additional authentication.
This vulnerability primarily affects the frontend of the website. It’s important to note that exploiting this vulnerability requires a valid user account.
Update to TYPO3 versions 8.7.55 ELTS, 9.5.44 ELTS, 10.4.41 ELTS, 11.5.33, 12.4.8 that fix the problem described above.
Thanks to Rémy Daniel who reported this issue, and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.
github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2023-47127.yaml
github.com/TYPO3/typo3
github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019
github.com/TYPO3/typo3/security/advisories/GHSA-3vmm-7h4j-69rm
nvd.nist.gov/vuln/detail/CVE-2023-47127
typo3.org/security/advisory/typo3-core-sa-2023-006
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
6.9 Medium
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
20.3%