CVE-2022-23502Insufficient Session Expiration in Typo3

Severity
5.4MEDIUMNVD
EPSS
0.2%
top 64.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 14

Description

TYPO3 is an open source PHP based web content management system. In versions prior to 10.4.33, 11.5.20, and 12.1.1, When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions. This issue is patched in versions 10.4.33, 11.5.20, 12.1.1.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.5

Affected Packages4 packages

Packagisttypo3/cms10.0.010.4.33+2
NVDtypo3/typo310.0.010.4.33+2
Packagisttypo3/cms-core10.0.010.4.33+2
CVEListV5typo3/typo3>= 10.0.0, < 10.4.33, >= 11.0.0, < 11.5.20, >= 12.0.0, < 12.1.1+2

🔴Vulnerability Details

3
CVEList
TYPO3 contains Insufficient Session Expiration after Password Reset2022-12-14
OSV
TYPO3 CMS vulnerable to Insufficient Session Expiration after Password Reset2022-12-13
GHSA
TYPO3 CMS vulnerable to Insufficient Session Expiration after Password Reset2022-12-13
CVE-2022-23502 — Insufficient Session Expiration | cvebase