First published: Tue Sep 13 2022(Updated: )
TYPO3-CORE-SA-2022-008: Missing check for expiration time of password reset token for backend users
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=10.0.0<10.4.32>=11.0.0<11.5.16 | |
composer/typo3/cms-core | >=10.0.0<10.4.32>=11.0.0<11.5.16 | |
Typo3 Typo3 | >=10.0.0<=10.4.31 | |
Typo3 Typo3 | >=11.0.0<=11.5.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36106 is a vulnerability in TYPO3 that allows an attacker to perform a password reset even if the password reset link has expired.
CVE-2022-36106 affects TYPO3 versions 10.0.0 to 10.4.32 and 11.0.0 to 11.5.16, allowing for unauthorized password resets.
CVE-2022-36106 has a severity rating of 5.4 (medium).
To fix CVE-2022-36106, you should upgrade TYPO3 to version 10.4.33 or 11.5.17 or apply the provided patches.
You can find more information about CVE-2022-36106 at the TYPO3 Security Advisory page and the associated GitHub links.