#VU83263 Improper Authentication in TYPO3


Published: 2023-11-20

Vulnerability identifier: #VU83263

Vulnerability risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-47127

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
TYPO3
Web applications / CMS

Vendor: TYPO3

Description

The vulnerability allows a remote user to bypass authentication process.

The vulnerability exists due to an error in handling user sessions in a multisite configuration. A remote user with access to one website can use their session token to access other websites deployed on the same CMS.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

TYPO3: 12.4.0 - 12.4.7, 12.0.0 - 12.3.0, 12.2.0, 12.1.0 - 12.1.3, 11.0.0 - 11.5.32, 10.0.0 - 10.4.40, 9.5.0 - 9.5.43, 9.0.0 - 9.4.0, 8.0.0 - 8.7.54


External links
http://github.com/TYPO3/typo3/security/advisories/GHSA-3vmm-7h4j-69rm
http://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019
http://typo3.org/security/advisory/typo3-core-sa-2023-006


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability