CVE-2020-26228Cleartext Storage of Sensitive Info in Typo3

Severity
7.5HIGHNVD
CNA8.1
EPSS
0.2%
top 60.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 23

Description

TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.23 and 10.4.10 user session identifiers were stored in cleartext - without processing with additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

Packagisttypo3/cms10.0.010.4.10+2
NVDtypo3/typo39.0.09.5.23+1
Packagisttypo3/cms-core9.0.09.5.23+2
CVEListV5typo3/typo3.cms>= 10.0.0, < 10.4.10, >= 9.0.0, < 9.5.23+1

🔴Vulnerability Details

3
CVEList
Cleartext storage of session identifier2020-11-23
GHSA
Cleartext storage of session identifier2020-11-23
OSV
Cleartext storage of session identifier2020-11-23
CVE-2020-26228 — Cleartext Storage of Sensitive Info | cvebase