First published: Tue Nov 14 2023(Updated: )
> ### CVSS: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N/E:X/RL:O/RC:C` (4.0) ### Problem Given that there are at least two different sites in the same TYPO3 installation - for instance _first.example.org_ and _second.example.com_ - then a session cookie generated for the first site can be reused on the second site without requiring additional authentication. This vulnerability primarily affects the frontend of the website. It's important to note that exploiting this vulnerability requires a valid user account. ### Solution Update to TYPO3 versions 8.7.55 ELTS, 9.5.44 ELTS, 10.4.41 ELTS, 11.5.33, 12.4.8 that fix the problem described above. ### Credits Thanks to Rémy Daniel who reported this issue, and to TYPO3 core & security team member Benjamin Franzke who fixed the issue. ### References * [TYPO3-CORE-SA-2023-006](https://typo3.org/security/advisory/typo3-core-sa-2023-006)
|Affected Software||Affected Version||How to fix|
The severity of GHSA-3vmm-7h4j-69rm is medium with a severity value of 4.2.
The GHSA-3vmm-7h4j-69rm vulnerability affects TYPO3 installations with version 8.0.0 to 12.4.7.
The impact of GHSA-3vmm-7h4j-69rm is low, with confidentiality and integrity being affected, but availability not being affected.
To fix the GHSA-3vmm-7h4j-69rm vulnerability, update your TYPO3 installation to version 8.7.55, 9.5.44, 10.4.41, 11.5.33, or 12.4.8.
More information about GHSA-3vmm-7h4j-69rm can be found in the GitHub security advisories and TYPO3 security advisory.