CVE-2020-26228 – typo3/cms-core
Package
Manager: composer
Name: typo3/cms-core
Vulnerable Version: >=9.0.0 <9.5.23 || >=10.0.0 <10.4.10 || >=8.7.0 <8.7.38
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00177 pctl0.39582
Details
Cleartext storage of session identifier User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. ### Solution Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described. ### Credits Thanks to TYPO3 security team member Helmut Hummel who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader as well as TYPO3 contributor Markus Klein who fixed the issue.
Metadata
Created: 2020-11-23T21:18:36Z
Modified: 2024-02-05T11:15:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/11/GHSA-954j-f27r-cj52/GHSA-954j-f27r-cj52.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-954j-f27r-cj52
Finding: F020
Auto approve: 1