CVE-2020-26228

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-26228
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26228.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-26228
Aliases
Withdrawn
2024-05-15T05:31:44.276400Z
Published
2020-11-23T21:15:12Z
Modified
2023-12-06T01:00:27.509793Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.23 and 10.4.10 user session identifiers were stored in cleartext - without processing with additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.

References

Affected packages

Git / github.com/benjaminkott/bootstrap_package

Affected ranges

Type
GIT
Repo
https://github.com/benjaminkott/bootstrap_package
Events
Type
GIT
Repo
https://github.com/typo3/typo3
Events
Type
GIT
Repo
https://github.com/typo3/typo3.cms
Events

Affected versions

10.*

10.0.0
10.0.1
10.0.10
10.0.11
10.0.2
10.0.3
10.0.4
10.0.5
10.0.6
10.0.7
10.0.8
10.0.9

11.*

11.0.0
11.0.1
11.0.2
11.0.3
11.0.4

12.*

12.0.0
12.0.1
12.0.10
12.0.2
12.0.3
12.0.4
12.0.5
12.0.6
12.0.7
12.0.8
12.0.9

13.*

13.0.0
13.0.1
13.0.2
13.0.3
13.0.4
13.0.5

14.*

14.0.0
14.0.1
14.0.2
14.0.3
14.0.4
14.0.5
14.0.6
14.0.7

9.*

9.0.0
9.0.1
9.0.2
9.0.3
9.0.4
9.1.0
9.1.1
9.1.2
9.1.3

v10.*

v10.0.0
v10.1.0
v10.2.0
v10.3.0
v10.4.0
v10.4.1
v10.4.2
v10.4.3
v10.4.4
v10.4.5
v10.4.6
v10.4.7
v10.4.8
v10.4.9