logo

CVE-2023-47127 typo3/cms-core

Package

Manager: composer
Name: typo3/cms-core
Vulnerable Version: >=8.0.0 <8.7.55 || >=9.0.0 <9.5.44 || >=10.0.0 <10.4.41 || >=11.0.0 <11.5.33 || >=12.0.0 <12.4.8

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00181 pctl0.40058

Details

TYPO3 vulnerable to Weak Authentication in Session Handling > ### CVSS: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N/E:X/RL:O/RC:C` (4.0) ### Problem Given that there are at least two different sites in the same TYPO3 installation - for instance _first.example.org_ and _second.example.com_ - then a session cookie generated for the first site can be reused on the second site without requiring additional authentication. This vulnerability primarily affects the frontend of the website. It's important to note that exploiting this vulnerability requires a valid user account. ### Solution Update to TYPO3 versions 8.7.55 ELTS, 9.5.44 ELTS, 10.4.41 ELTS, 11.5.33, 12.4.8 that fix the problem described above. ### Credits Thanks to Rémy Daniel who reported this issue, and to TYPO3 core & security team member Benjamin Franzke who fixed the issue. ### References * [TYPO3-CORE-SA-2023-006](https://typo3.org/security/advisory/typo3-core-sa-2023-006)

Metadata

Created: 2023-11-14T18:30:21Z
Modified: 2023-12-15T22:14:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-3vmm-7h4j-69rm/GHSA-3vmm-7h4j-69rm.json
CWE IDs: ["CWE-287", "CWE-302"]
Alternative ID: GHSA-3vmm-7h4j-69rm
Finding: F006
Auto approve: 1