CVE-2021-32767Log File Information Exposure in CMS

Severity
6.5MEDIUMNVD
CNA5.3
EPSS
0.3%
top 44.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 20
Latest updateJul 26

Description

TYPO3 is an open source PHP based web content management system. In versions 9.0.0 through 9.5.27, 10.0.0 through 10.4.17, and 11.0.0 through 11.3.0, user credentials may been logged as plain-text. This occurs when explicitly using log level debug, which is not the default configuration. TYPO3 versions 9.5.28, 10.4.18, 11.3.1 contain a patch for this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

Packagisttypo3/cms10.0.010.4.18+2
Packagisttypo3/cms-core7.0.07.6.52+4
NVDtypo3/typo37.0.07.6.51+4
CVEListV5typo3/typo3.cms>= 10.0.0, < 10.4.18, >= 11.0.0, < 11.3.1, >= 9.0.0, < 9.5.28+2

🔴Vulnerability Details

3
GHSA
Information Disclosure in User Authentication2021-07-26
OSV
Information Disclosure in User Authentication2021-07-26
CVEList
Information Disclosure in User Authentication2021-07-20
CVE-2021-32767 — Log File Information Exposure in CMS | cvebase