Vulnerability CVE-2020-26228


Published: 2020-11-23   Modified: 2020-11-24

Description:
TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.23 and 10.4.10 user session identifiers were stored in cleartext - without processing with additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.

Type:

CWE-312

(Cleartext Storage of Sensitive Information)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Typo3 -> Typo3 

 References:
https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-954j-f27r-cj52
https://typo3.org/security/advisory/typo3-core-sa-2020-011

Copyright 2024, cxsecurity.com

 

Back to Top