2.6
CVSSv2

CVE-2015-2047

Published: 23/02/2015 Updated: 30/11/2016
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

The rsaauth extension in TYPO3 4.3.0 up to and including 4.3.14, 4.4.0 up to and including 4.4.15, 4.5.0 up to and including 4.5.39, and 4.6.0 up to and including 4.6.18, when configured for the frontend, allows remote malicious users to bypass authentication via a password that is casted to an empty value.

Vulnerable Product Search on Vulmon Subscribe to Product

typo3 typo3 4.3.2

typo3 typo3 4.3.3

typo3 typo3 4.3.10

typo3 typo3 4.3.11

typo3 typo3 4.4.4

typo3 typo3 4.4.5

typo3 typo3 4.4.12

typo3 typo3 4.4.13

typo3 typo3 4.5.4

typo3 typo3 4.5.5

typo3 typo3 4.5.13

typo3 typo3 4.5.14

typo3 typo3 4.5.21

typo3 typo3 4.5.22

typo3 typo3 4.5.29

typo3 typo3 4.5.30

typo3 typo3 4.5.38

typo3 typo3 4.5.39

typo3 typo3 4.6.5

typo3 typo3 4.6.6

typo3 typo3 4.6.13

typo3 typo3 4.3.0

typo3 typo3 4.3.1

typo3 typo3 4.3.8

typo3 typo3 4.3.9

typo3 typo3 4.4.1

typo3 typo3 4.4.2

typo3 typo3 4.4.3

typo3 typo3 4.3.4

typo3 typo3 4.3.5

typo3 typo3 4.3.12

typo3 typo3 4.3.13

typo3 typo3 4.4.6

typo3 typo3 4.4.7

typo3 typo3 4.4.14

typo3 typo3 4.4.15

typo3 typo3 4.5.6

typo3 typo3 4.5.7

typo3 typo3 4.5.15

typo3 typo3 4.5.16

typo3 typo3 4.5.23

typo3 typo3 4.5.24

typo3 typo3 4.5.31

typo3 typo3 4.5.32

typo3 typo3 4.5.33

typo3 typo3 4.6

typo3 typo3 4.6.0

typo3 typo3 4.6.7

typo3 typo3 4.6.8

typo3 typo3 4.6.16

typo3 typo3 4.6.17

typo3 typo3 4.6.14

typo3 typo3 4.6.15

typo3 typo3 4.4.10

typo3 typo3 4.4.11

typo3 typo3 4.5.2

typo3 typo3 4.5.3

typo3 typo3 4.5.11

typo3 typo3 4.5.12

typo3 typo3 4.5.19

typo3 typo3 4.5.20

typo3 typo3 4.5.27

typo3 typo3 4.5.28

typo3 typo3 4.5.36

typo3 typo3 4.5.37

typo3 typo3 4.6.3

typo3 typo3 4.6.4

typo3 typo3 4.6.11

typo3 typo3 4.6.12

typo3 typo3 4.3.6

typo3 typo3 4.3.7

typo3 typo3 4.3.14

typo3 typo3 4.4.0

typo3 typo3 4.4.8

typo3 typo3 4.4.9

typo3 typo3 4.5.0

typo3 typo3 4.5.1

typo3 typo3 4.5.8

typo3 typo3 4.5.9

typo3 typo3 4.5.10

typo3 typo3 4.5.17

typo3 typo3 4.5.18

typo3 typo3 4.5.25

typo3 typo3 4.5.26

typo3 typo3 4.5.34

typo3 typo3 4.5.35

typo3 typo3 4.6.1

typo3 typo3 4.6.2

typo3 typo3 4.6.9

typo3 typo3 4.6.10

typo3 typo3 4.6.18

debian debian linux 7.0

Vendor Advisories

Pierrick Caillon discovered that the authentication could be bypassed in the Typo 3 content management system Please refer to the upstream advisory for additional information: typo3org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/ For the stable distribution (wheezy), this problem has been fixed in version 4519+df ...