First published: Thu May 22 2014(Updated: )
Improper Session Invalidation
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=6.2.0<6.2.3 | |
composer/typo3/cms | >=6.2.0<6.2.3 | 6.2.3 |
TYPO3 | =6.2 | |
TYPO3 | =6.2.0-beta1 | |
TYPO3 | =6.2.0-beta2 | |
TYPO3 | =6.2.0-beta3 | |
TYPO3 | =6.2.1 | |
TYPO3 | =6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-3944 is classified as high due to the potential for attackers to bypass authentication.
To fix CVE-2014-3944, upgrade TYPO3 to version 6.2.3 or later.
CVE-2014-3944 affects TYPO3 versions 6.2.0 through 6.2.2.
Yes, CVE-2014-3944 can allow remote attackers to bypass authentication and gain unauthorized access.
Yes, the patch for CVE-2014-3944 is included in the TYPO3 version 6.2.3 update.