7.5
CVSSv3

CVE-2020-26228

Published: 23/11/2020 Updated: 01/12/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

TYPO3 is an open source PHP based web content management system. In TYPO3 prior to 9.5.23 and 10.4.10 user session identifiers were stored in cleartext - without processing with additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

typo3 typo3

Github Repositories

share This is a collection of recent presentations and slides 2019 Aug 1st, 2019: πŸ“„ TYPO3 Developer Days 2019: Hacking TYPO3 🎦 YouTube stream πŸ” TYPO3-CORE-SA-2018-009: Security Misconfiguration in Install Tool Cookie πŸ” TYPO3-CORE-SA-2018-006: Cross-Site Scripting in Online Media Asset Rendering πŸ” TYPO3-CORE-SA-2019-019: Arbitrary Code Execution and Cross-Sit