Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-32767


TYPO3 is an open source PHP based web content management system. In versions 9.0.0 through 9.5.27, 10.0.0 through 10.4.17, and 11.0.0 through 11.3.0, user credentials may been logged as plain-text. This occurs when explicitly using log level debug, which is not the default configuration. TYPO3 versions 9.5.28, 10.4.18, 11.3.1 contain a patch for this vulnerability.


Published

2021-07-20T16:15:07.890

Last Modified

2024-11-21T06:07:42.043

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

6.8

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-532
  • Type: Primary
    CWE-532

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application typo3 typo3 ≤ 7.6.51 Yes
Application typo3 typo3 ≤ 8.7.40 Yes
Application typo3 typo3 ≤ 9.5.27 Yes
Application typo3 typo3 ≤ 10.4.17 Yes
Application typo3 typo3 ≤ 11.3.0 Yes

References