Vulnerability Name:

CVE-2022-36105 (CCN-236060)

Assigned:2022-09-13
Published:2022-09-13
Updated:2022-09-16
Summary:TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that observing response time during user authentication (backend and frontend) can be used to distinguish between existing and non-existing user accounts. Extension authors of 3rd party TYPO3 extensions providing a custom authentication service should check if the extension is affected by the described problem. Affected extensions must implement new `MimicServiceInterface::mimicAuthUser`, which simulates corresponding times regular processing would usually take. Update to TYPO3 version 7.6.58 ELTS, 8.7.48 ELTS, 9.5.37 ELTS, 10.4.32 or 11.5.16 that fix this problem. There are no known workarounds for this issue.
CVSS v3 Severity:5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
5.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)
5.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-203
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2022-36105

Source: XF
Type: UNKNOWN
typo3-cve202236105-info-disc(236060)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/TYPO3/typo3/commit/f8b83ce15d4ea275a5a5e564e5d324242f7937b6

Source: CONFIRM
Type: Third Party Advisory
https://github.com/TYPO3/typo3/security/advisories/GHSA-m392-235j-9r7r

Source: CCN
Type: TYPO3-CORE-SA-2022-007
User Enumeration via Response Timing

Source: MISC
Type: Vendor Advisory
https://typo3.org/security/advisory/typo3-core-sa-2022-007

Vulnerable Configuration:Configuration 1:
  • cpe:/a:typo3:typo3:*:*:*:*:*:*:*:* (Version >= 10.0.0 and <= 10.4.31)
  • OR cpe:/a:typo3:typo3:*:*:*:*:*:*:*:* (Version >= 11.0.0 and <= 11.5.15)
  • OR cpe:/a:typo3:typo3:*:*:*:*:*:*:*:* (Version >= 7.0.0 and <= 7.6.57)
  • OR cpe:/a:typo3:typo3:*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.7.47)
  • OR cpe:/a:typo3:typo3:*:*:*:*:*:*:*:* (Version >= 9.0.0 and <= 9.5.36)

  • Configuration CCN 1:
  • cpe:/a:typo3:typo3:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:8.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:9.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:typo3:typo3:11.0.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    typo3 typo3 *
    typo3 typo3 *
    typo3 typo3 *
    typo3 typo3 *
    typo3 typo3 *
    typo3 typo3 7.0.0
    typo3 typo3 8.0.0
    typo3 typo3 9.0.0
    typo3 typo3 10.0.0
    typo3 typo3 11.0.0