Vulnerability Name: | CVE-2022-31050 (CCN-228846) | ||||||||||||
Assigned: | 2022-06-14 | ||||||||||||
Published: | 2022-06-14 | ||||||||||||
Updated: | 2022-06-23 | ||||||||||||
Summary: | TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, Admin Tool sessions initiated via the TYPO3 backend user interface had not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem. | ||||||||||||
CVSS v3 Severity: | 7.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) 6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-613 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-31050 Source: XF Type: UNKNOWN typo3-cve202231050-sec-bypass(228846) Source: MISC Type: Patch, Third Party Advisory https://github.com/TYPO3/typo3/commit/592387972912290c135ebecc91768a67f83a3a4d Source: CONFIRM Type: Third Party Advisory https://github.com/TYPO3/typo3/security/advisories/GHSA-wwjw-r3gj-39fq Source: CCN Type: TYPO3-CORE-SA-2022-005 Insufficient Session Expiration in Admin Tool Source: MISC Type: Vendor Advisory https://typo3.org/security/advisory/typo3-core-sa-2022-005 | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |