Описание
Cleartext storage of session identifier
Problem
User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system.
Solution
Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
Credits
Thanks to TYPO3 security team member Oliver Hader who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader who fixed the issue.
References
Ссылки
- https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-qx3w-4864-94ch
- https://nvd.nist.gov/vuln/detail/CVE-2021-21339
- https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2021-21339.yaml
- https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2021-21339.yaml
- https://packagist.org/packages/typo3/cms-core
- https://typo3.org/security/advisory/typo3-core-sa-2021-006
Пакеты
typo3/cms-core
>= 6.2.0, <= 6.2.56
6.2.57
typo3/cms-core
>= 7.0.0, <= 7.6.50
7.6.51
typo3/cms-core
>= 8.0.0, <= 8.7.39
8.7.40
typo3/cms-core
>= 10.0.0, < 10.4.14
10.4.14
typo3/cms-core
>= 11.0.0, < 11.1.1
11.1.1
typo3/cms-core
>= 9.0.0, < 9.5.25
9.5.25
typo3/cms
>= 10.0.0, < 10.4.14
10.4.14
typo3/cms
>= 11.0.0, < 11.1.1
11.1.1
typo3/cms
>= 9.0.0, < 9.5.25
9.5.25
Связанные уязвимости
TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 user session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. This is fixed in versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1.