Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-2047

Опубликовано: 23 фев. 2015
Источник: nvd
CVSS2: 2.6
EPSS Низкий

Описание

The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.9:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.10:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.11:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.12:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.13:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.3.14:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.7:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.8:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.9:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.10:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.11:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.12:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.13:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.14:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.4.15:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.22:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.23:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.24:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.25:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.26:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.27:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.28:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.29:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.30:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.31:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.32:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.33:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.34:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.35:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.36:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.37:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.38:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.5.39:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.12:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.13:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.14:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.15:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.16:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.17:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:4.6.18:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

EPSS

Процентиль: 73%
0.00766
Низкий

2.6 Low

CVSS2

Дефекты

CWE-287

Связанные уязвимости

ubuntu
почти 11 лет назад

The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.

debian
почти 11 лет назад

The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4 ...

github
больше 3 лет назад

The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.

suse-cvrf
больше 9 лет назад

Security update for typo3-cms-4_5

EPSS

Процентиль: 73%
0.00766
Низкий

2.6 Low

CVSS2

Дефекты

CWE-287