logo

CVE-2021-21339 typo3/cms-core

Package

Manager: composer
Name: typo3/cms-core
Vulnerable Version: >=6.2.0 <6.2.57 || >=7.0.0 <7.6.51 || >=8.0.0 <8.7.40 || >=10.0.0 <10.4.14 || >=11.0.0 <11.1.1 || >=9.0.0 <9.5.25

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00132 pctl0.33533

Details

Cleartext storage of session identifier ### Problem User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. ### Solution Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader who fixed the issue. ### References * [TYPO3-CORE-SA-2021-006](https://typo3.org/security/advisory/typo3-core-sa-2021-006)

Metadata

Created: 2021-03-23T01:53:42Z
Modified: 2021-03-29T17:59:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-qx3w-4864-94ch/GHSA-qx3w-4864-94ch.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-qx3w-4864-94ch
Finding: F020
Auto approve: 1