TYPO3 up to 9.5.33 ELTS/10.4.28/11.5.10 Backend User Interface session expiration
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.2 | $0-$5k | 0.00 |
A vulnerability classified as critical was found in TYPO3 up to 9.5.33 ELTS/10.4.28/11.5.10 (Content Management System). This vulnerability affects an unknown code of the component Backend User Interface. The manipulation with an unknown input leads to a session expiration vulnerability. The CWE definition for the vulnerability is CWE-613. According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization." As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, Admin Tool sessions initiated via the TYPO3 backend user interface had not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.
The weakness was presented 06/15/2022 as GHSA-wwjw-r3gj-39fq. The advisory is available at github.com. This vulnerability was named CVE-2022-31050 since 05/18/2022. The technical details are unknown and an exploit is not available.
Upgrading to version 9.5.34 ELTS, 10.4.29 or 11.5.11 eliminates this vulnerability. Applying the patch 592387972912290c135ebecc91768a67f83a3a4d is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Product
Type
Name
Version
- 9.5.33 ELTS
- 10.4.0
- 10.4.1
- 10.4.2
- 10.4.3
- 10.4.4
- 10.4.5
- 10.4.6
- 10.4.7
- 10.4.8
- 10.4.9
- 10.4.10
- 10.4.11
- 10.4.12
- 10.4.13
- 10.4.14
- 10.4.15
- 10.4.16
- 10.4.17
- 10.4.18
- 10.4.19
- 10.4.20
- 10.4.21
- 10.4.22
- 10.4.23
- 10.4.24
- 10.4.25
- 10.4.26
- 10.4.27
- 10.4.28
- 11.5.0
- 11.5.1
- 11.5.2
- 11.5.3
- 11.5.4
- 11.5.5
- 11.5.6
- 11.5.7
- 11.5.8
- 11.5.9
- 11.5.10
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.2
VulDB Base Score: 4.7
VulDB Temp Score: 4.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CNA Base Score: 6.0
CNA Vector (GitHub, Inc.): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Session expirationCWE: CWE-613
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: TYPO3 9.5.34 ELTS/10.4.29/11.5.11
Patch: 592387972912290c135ebecc91768a67f83a3a4d
Timeline
05/18/2022 🔍06/15/2022 🔍
06/15/2022 🔍
06/17/2022 🔍
Sources
Product: typo3.orgAdvisory: GHSA-wwjw-r3gj-39fq
Status: Confirmed
CVE: CVE-2022-31050 (🔍)
Entry
Created: 06/15/2022 07:38 AMUpdated: 06/17/2022 03:02 PM
Changes: 06/15/2022 07:38 AM (43), 06/17/2022 03:02 PM (12)
Complete: 🔍
Cache ID: 18:7D1:40
No comments yet. Languages: en.
Please log in to comment.