Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-3vmm-7h4j-69rm: TYPO3 vulnerable to Weak Authentication in Session Handling

CVSS: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N/E:X/RL:O/RC:C (4.0)

Problem

Given that there are at least two different sites in the same TYPO3 installation - for instance first.example.org and second.example.com - then a session cookie generated for the first site can be reused on the second site without requiring additional authentication.

This vulnerability primarily affects the frontend of the website. It’s important to note that exploiting this vulnerability requires a valid user account.

Solution

Update to TYPO3 versions 8.7.55 ELTS, 9.5.44 ELTS, 10.4.41 ELTS, 11.5.33, 12.4.8 that fix the problem described above.

Credits

Thanks to Rémy Daniel who reported this issue, and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.

References

ghsa
#vulnerability#web#git#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-47127

TYPO3 vulnerable to Weak Authentication in Session Handling

Moderate severity GitHub Reviewed Published Nov 14, 2023 in TYPO3/typo3 • Updated Nov 14, 2023

Package

composer typo3/cms-core (Composer)

Affected versions

>= 8.0.0, <= 8.7.54

>= 9.0.0, <= 9.5.43

>= 10.0.0, <= 10.4.40

>= 11.0.0, <= 11.5.32

>= 12.0.0, <= 12.4.7

Patched versions

8.7.55

9.5.44

10.4.41

11.5.33

12.4.8

CVSS: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N/E:X/RL:O/RC:C (4.0)

Problem

Given that there are at least two different sites in the same TYPO3 installation - for instance first.example.org and second.example.com - then a session cookie generated for the first site can be reused on the second site without requiring additional authentication.

This vulnerability primarily affects the frontend of the website. It’s important to note that exploiting this vulnerability requires a valid user account.

Solution

Update to TYPO3 versions 8.7.55 ELTS, 9.5.44 ELTS, 10.4.41 ELTS, 11.5.33, 12.4.8 that fix the problem described above.

Credits

Thanks to Rémy Daniel who reported this issue, and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.

References

  • TYPO3-CORE-SA-2023-006

References

  • GHSA-3vmm-7h4j-69rm
  • TYPO3/typo3@535dfbd
  • https://typo3.org/security/advisory/typo3-core-sa-2023-006

Published to the GitHub Advisory Database

Nov 14, 2023

Last updated

Nov 14, 2023

Related news

CVE-2023-47127: Weak Authentication in Session Handling

TYPO3 is an open source PHP based web content management system released under the GNU GPL. In typo3 installations there are always at least two different sites. Eg. first.example.org and second.example.com. In affected versions a session cookie generated for the first site can be reused on the second site without requiring additional authentication. This vulnerability has been addressed in versions 8.7.55, 9.5.44, 10.4.41, 11.5.33, and 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.