Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-36105


TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that observing response time during user authentication (backend and frontend) can be used to distinguish between existing and non-existing user accounts. Extension authors of 3rd party TYPO3 extensions providing a custom authentication service should check if the extension is affected by the described problem. Affected extensions must implement new `MimicServiceInterface::mimicAuthUser`, which simulates corresponding times regular processing would usually take. Update to TYPO3 version 7.6.58 ELTS, 8.7.48 ELTS, 9.5.37 ELTS, 10.4.32 or 11.5.16 that fix this problem. There are no known workarounds for this issue.


Published

2022-09-13T18:15:14.827

Last Modified

2024-11-21T07:12:24.010

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-203

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application typo3 typo3 ≤ 7.6.57 Yes
Application typo3 typo3 ≤ 8.7.47 Yes
Application typo3 typo3 ≤ 9.5.36 Yes
Application typo3 typo3 ≤ 10.4.31 Yes
Application typo3 typo3 ≤ 11.5.15 Yes

References