Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hj78-p4h7-m5fv

Опубликовано: 28 янв. 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.2

Описание

TYPO3-EXT-SA-2025-001: Account Takeover in extension "OpenID Connect Authentication" (oidc)

Problem Description

A vulnerability in the account linking logic of the extension allows a pre-hijacking attack leading to Account Takeover. The attack can only be exploited if the following requirements are met:

  • An attacker can anticipate the email address of the user.
  • An attacker can register a public frontend user account using that email address before the user's first OIDC login.
  • The IDP returns the field email containing the email address of the user

Solution

An updated versions 4.0.0 is available from the TYPO3 extension manager, packagist and at https://extensions.typo3.org/extension/download/oidc/4.0.0/zip

Users of the extension are advised to update the extension as soon as possible.

Пакеты

Наименование

causal/oidc

composer
Затронутые версииВерсия исправления

>= 3.0.0, < 4.0.0

4.0.0

EPSS

Процентиль: 21%
0.00068
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-288
CWE-348
CWE-639

Связанные уязвимости

CVSS3: 4.2
nvd
11 месяцев назад

An issue was discovered in the oidc (aka OpenID Connect Authentication) extension before 4.0.0 for TYPO3. The account linking logic allows a pre-hijacking attack, leading to Account Takeover. The attack can only be exploited if the following requirements are met: (1) an attacker can anticipate the e-mail address of the user, (2) an attacker can register a public frontend user account using that e-mail address before the user's first OIDC login, and (3) the IDP returns an email field containing the e-mail address of the user,

EPSS

Процентиль: 21%
0.00068
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-288
CWE-348
CWE-639