First published: Tue Sep 13 2022(Updated: )
TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the expiration time of a password reset link for TYPO3 backend users has never been evaluated. As a result, a password reset link could be used to perform a password reset even if the default expiry time of two hours has been exceeded. Update to TYPO3 version 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms | >=10.0.0<10.4.32>=11.0.0<11.5.16 | |
composer/typo3/cms-core | >=10.0.0<10.4.32>=11.0.0<11.5.16 | |
Typo3 Typo3 | >=10.0.0<=10.4.31 | |
Typo3 Typo3 | >=11.0.0<=11.5.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36106 is a vulnerability in TYPO3 that allows an attacker to perform a password reset even if the password reset link has expired.
CVE-2022-36106 affects TYPO3 versions 10.0.0 to 10.4.32 and 11.0.0 to 11.5.16, allowing for unauthorized password resets.
CVE-2022-36106 has a severity rating of 5.4 (medium).
To fix CVE-2022-36106, you should upgrade TYPO3 to version 10.4.33 or 11.5.17 or apply the provided patches.
You can find more information about CVE-2022-36106 at the TYPO3 Security Advisory page and the associated GitHub links.