Lucene search

K
osvGoogleOSV:GHSA-RXC9-F2X6-QH4W
HistoryMay 30, 2024 - 3:39 p.m.

TYPO3 Security Misconfiguration for Backend User Accounts

2024-05-3015:39:01
Google
osv.dev
1
typo3
security misconfiguration
backend user accounts
database records
weak credentials
authentication service
vulnerability

7.3 High

AI Score

Confidence

Low

When using the TYPO3 backend in order to create new backend user accounts, database records containing insecure or empty credentials might be persisted. When the type of user account is changed - which might be entity type or the admin flag for backend users - the backend form is reloaded in order to reflect changed configuration possibilities. However, this leads to persisting the current state as well, which can result into some of the following:

  • account contains empty login credentials (username and/or password)
  • account is incomplete and contains weak credentials (username and/or password)

Albeit the functionality provided by the TYPO3 core cannot be used either with empty usernames or empty passwords, it still can be a severe vulnerability to custom authentication service implementations.

This weakness cannot be directly exploited and requires interaction on purpose by some backend user having according privileges.

7.3 High

AI Score

Confidence

Low