First published: Tue Feb 13 2024(Updated: )
### Problem Password hashes were being reflected in the editing forms of the TYPO3 backend user interface. This allowed attackers to crack the plaintext password using brute force techniques. Exploiting this vulnerability requires a valid backend user account. ### Solution Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described. ### Credits Thanks to the TYPO3 framework merger Christian Kuhn and external security researchers Maximilian Beckmann, Klaus-Günther Schmidt who reported this issue, and TYPO3 security team member Oliver Hader who fixed the issue. ### References * [TYPO3-CORE-SA-2024-003](https://typo3.org/security/advisory/typo3-core-sa-2024-003)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms-core | =13.0.0 | 13.0.1 |
composer/typo3/cms-core | >=12.0.0<=12.4.10 | 12.4.11 |
composer/typo3/cms-core | >=11.0.0<=11.5.34 | 11.5.35 |
composer/typo3/cms-core | >=10.0.0<=10.4.42 | 10.4.43 |
composer/typo3/cms-core | >=9.0.0<=9.5.45 | 9.5.46 |
composer/typo3/cms-core | >=8.0.0<=8.7.56 | 8.7.57 |
Typo3 Typo3 | >=8.0.0<8.7.57 | |
Typo3 Typo3 | >=9.0.0<9.5.46 | |
Typo3 Typo3 | >=10.0.0<10.4.43 | |
Typo3 Typo3 | >=11.0.0<11.5.35 | |
Typo3 Typo3 | >=12.0.0<12.4.11 | |
Typo3 Typo3 | =13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.