Headline
GHSA-mgj2-q8wp-29rr: TYPO3 CMS vulnerable to Insufficient Session Expiration after Password Reset
Problem
When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions.
Solution
Update to TYPO3 versions 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.
References
Package
composer typo3/cms-core (Composer)
Affected versions
>= 10.0.0, < 10.4.33
>= 11.0.0, < 11.5.20
>= 12.0.0, < 12.1.1
Patched versions
10.4.33
11.5.20
12.1.1
Description
Problem
When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions.
Solution
Update to TYPO3 versions 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.
References
- TYPO3-CORE-SA-2022-014
References
- GHSA-mgj2-q8wp-29rr
- TYPO3/typo3@d9ffbf2
- https://typo3.org/security/advisory/typo3-core-sa-2022-014
ohader published the maintainer security advisory
Dec 13, 2022
Related news
TYPO3 is an open source PHP based web content management system. In versions prior to 10.4.33, 11.5.20, and 12.1.1, When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions. This issue is patched in versions 10.4.33, 11.5.20, 12.1.1.