First published: Tue Nov 17 2020(Updated: )
TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.23 and 10.4.10 user session identifiers were stored in cleartext - without processing with additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms-core | >=10.0.0<10.4.10>=9.0.0<9.5.23>=8.7.0<8.7.38 | |
composer/typo3/cms | >=10.0.0<10.4.10>=9.0.0<9.5.23>=8.7.0<8.7.38 | |
Typo3 Typo3 | >=9.0.0<9.5.23 | |
Typo3 Typo3 | >=10.0.0<10.4.10 | |
composer/typo3/cms | >=8.7.0<8.7.38 | 8.7.38 |
composer/typo3/cms | >=9.0.0<9.5.23 | 9.5.23 |
composer/typo3/cms | >=10.0.0<10.4.10 | 10.4.10 |
composer/typo3/cms-core | >=8.7.0<8.7.38 | 8.7.38 |
composer/typo3/cms-core | >=10.0.0<10.4.10 | 10.4.10 |
composer/typo3/cms-core | >=9.0.0<9.5.23 | 9.5.23 |
>=9.0.0<9.5.23 | ||
>=10.0.0<10.4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
TYPO3-CORE-SA-2020-011 is a vulnerability that allows for cleartext storage of session identifiers in TYPO3 CMS.
TYPO3-CORE-SA-2020-011 can lead to an attacker being able to intercept and use session identifiers, potentially compromising user sessions.
TYPO3 versions 8.7.0 to 8.7.38, 9.0.0 to 9.5.23, and 10.0.0 to 10.4.10 are affected by TYPO3-CORE-SA-2020-011.
To fix TYPO3-CORE-SA-2020-011, update TYPO3 to a version that includes the security fix.
More information about TYPO3-CORE-SA-2020-011 can be found on the TYPO3 website at https://typo3.org/security/advisory/typo3-core-sa-2020-011.