Vulnerability Name:

CCN-56500

Published:2010-02-23
Updated:2010-02-23
Summary:TYPO3 could allow an attacker to gain unauthorized access, caused by an error when the saltedpasswords extension is enabled and configured to use several authentication services for the frontend. A remote attacker with knowledge of a salted hashed password could exploit this vulnerability to bypass authentication and gain unauthorized access to the application.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: SA38668
TYPO3 Multiple Vulnerabilities

Source: CCN
Type: TYPO3-SA-2010-004
Multiple vulnerabilities in TYPO3 Core

Source: DEBIAN
Type: DSA-2008
typo3-src -- several vulnerabilities

Source: CCN
Type: BID-38366
TYPO3 Core Multiple Remote Security Vulnerabilities

Source: XF
Type: UNKNOWN
typo3-saltedpasswords-auth-bypass(56500)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:typo3:typo3:4.3.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    typo3 typo3 4.3.1
    debian debian linux 5.0