#VU83263 Improper Authentication in TYPO3 - CVE-2023-47127


Vulnerability identifier: #VU83263

Vulnerability risk: Low

CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-47127

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
TYPO3
Web applications / CMS

Vendor: TYPO3

Description

The vulnerability allows a remote user to bypass authentication process.

The vulnerability exists due to an error in handling user sessions in a multisite configuration. A remote user with access to one website can use their session token to access other websites deployed on the same CMS.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

TYPO3: 8.0.0 - 8.7.54, 9.0.0 - 9.5.43, 10.0.0 - 12.4.7


External links
https://github.com/TYPO3/typo3/security/advisories/GHSA-3vmm-7h4j-69rm
https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019
https://typo3.org/security/advisory/typo3-core-sa-2023-006


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability