CVE-2023-47127Authentication Bypass by Assumed-Immutable Data in Typo3

Severity
5.4MEDIUMNVD
CNA4.2
EPSS
0.2%
top 60.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 14

Description

TYPO3 is an open source PHP based web content management system released under the GNU GPL. In typo3 installations there are always at least two different sites. Eg. first.example.org and second.example.com. In affected versions a session cookie generated for the first site can be reused on the second site without requiring additional authentication. This vulnerability has been addressed in versions 8.7.55, 9.5.44, 10.4.41, 11.5.33, and 12.4.8. Users are advised to upgrade. There are no known wo

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.5

Affected Packages3 packages

NVDtypo3/typo38.0.08.7.55+4
Packagisttypo3/cms-core8.0.08.7.55+4
CVEListV5typo3/typo35 versions+4

Patches

🔴Vulnerability Details

3
GHSA
TYPO3 vulnerable to Weak Authentication in Session Handling2023-11-14
CVEList
Weak Authentication in Session Handling in typo3/cms-core2023-11-14
OSV
TYPO3 vulnerable to Weak Authentication in Session Handling2023-11-14
CVE-2023-47127 — Typo3 vulnerability | cvebase