First published: Tue May 12 2020(Updated: )
In TYPO3 CMS 10.4.0 through 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts. This has been fixed in 10.4.2. ### References * https://typo3.org/security/advisory/typo3-core-sa-2020-001
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=10.0.0<10.4.2 | |
composer/typo3/cms-core | >=10.0.0<10.4.2 | |
Typo3 Typo3 | =10.4.0 | |
Typo3 Typo3 | =10.4.1 | |
composer/typo3/cms | >=10.0.0<10.4.2 | 10.4.2 |
composer/typo3/cms-core | >=10.0.0<10.4.2 | 10.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11063 is a vulnerability in TYPO3 CMS versions 10.4.0 and 10.4.1 that allows time-based attacks with the password reset functionality, leading to user enumeration based on email addresses.
CVE-2020-11063 affects TYPO3 CMS versions 10.4.0 and 10.4.1.
The severity of CVE-2020-11063 is medium with a CVSS score of 3.7.
To fix CVE-2020-11063, update TYPO3 CMS to version 10.4.2.
You can find more information about CVE-2020-11063 in the TYPO3 security advisory (https://typo3.org/security/advisory/typo3-core-sa-2020-001) and the GitHub security advisory (https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-347x-877p-hcwx).