Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zdm1tLTdoNGotNjlybc4AA3GT
TYPO3 vulnerable to Weak Authentication in Session Handling
CVSS:
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N/E:X/RL:O/RC:C
(4.0)
Problem
Given that there are at least two different sites in the same TYPO3 installation - for instance first.example.org and second.example.com - then a session cookie generated for the first site can be reused on the second site without requiring additional authentication.
This vulnerability primarily affects the frontend of the website. It's important to note that exploiting this vulnerability requires a valid user account.
Solution
Update to TYPO3 versions 8.7.55 ELTS, 9.5.44 ELTS, 10.4.41 ELTS, 11.5.33, 12.4.8 that fix the problem described above.
Credits
Thanks to Rémy Daniel who reported this issue, and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.
References
Permalink: https://github.com/advisories/GHSA-3vmm-7h4j-69rmJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zdm1tLTdoNGotNjlybc4AA3GT
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 14 days ago
Updated: 7 days ago
CVSS Score: 4.2
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Identifiers: GHSA-3vmm-7h4j-69rm, CVE-2023-47127
References:
- https://github.com/TYPO3/typo3/security/advisories/GHSA-3vmm-7h4j-69rm
- https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019
- https://typo3.org/security/advisory/typo3-core-sa-2023-006
- https://nvd.nist.gov/vuln/detail/CVE-2023-47127
- https://github.com/advisories/GHSA-3vmm-7h4j-69rm
Affected Packages
packagist:typo3/cms-core
Versions: >= 12.0.0, <= 12.4.7, >= 11.0.0, <= 11.5.32, >= 10.0.0, <= 10.4.40, >= 9.0.0, <= 9.5.43, >= 8.0.0, <= 8.7.54Fixed in: 12.4.8, 11.5.33, 10.4.41, 9.5.44, 8.7.55