First published: Tue Sep 13 2022(Updated: )
TYPO3-CORE-SA-2022-007: User Enumeration via Response Timing
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=10.0.0<10.4.32>=11.0.0<11.5.16 | |
composer/typo3/cms-core | >=10.0.0<10.4.32>=11.0.0<11.5.16 | |
Typo3 Typo3 | >=7.0.0<=7.6.57 | |
Typo3 Typo3 | >=8.0.0<=8.7.47 | |
Typo3 Typo3 | >=9.0.0<=9.5.36 | |
Typo3 Typo3 | >=10.0.0<=10.4.31 | |
Typo3 Typo3 | >=11.0.0<=11.5.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36105 is a vulnerability in TYPO3 that allows an attacker to distinguish between existing and non-existing user accounts by observing response time during user authentication.
The severity of CVE-2022-36105 is medium with a CVSS score of 5.3.
CVE-2022-36105 affects TYPO3 versions 10.0.0 to 10.4.32, 11.0.0 to 11.5.16, and other versions mentioned in the advisory.
To fix CVE-2022-36105, upgrade TYPO3 to a version that is not affected by the vulnerability, as mentioned in the advisory.
You can find more information about CVE-2022-36105 in the TYPO3 security advisory TYPO3-CORE-SA-2022-007 and the related GitHub links.