The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/72763 | vdb-entry x_refsource_BID |
https://review.typo3.org/#/c/37013/ | x_refsource_CONFIRM |
http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html | vendor-advisory x_refsource_SUSE |
http://www.securitytracker.com/id/1031824 | vdb-entry x_refsource_SECTRACK |
http://www.openwall.com/lists/oss-security/2015/02/22/4 | mailing-list x_refsource_MLIST |
http://www.openwall.com/lists/oss-security/2015/02/22/8 | mailing-list x_refsource_MLIST |
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/ | x_refsource_CONFIRM |
http://www.debian.org/security/2015/dsa-3164 | vendor-advisory x_refsource_DEBIAN |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/72763 | vdb-entry x_refsource_BID x_transferred |
https://review.typo3.org/#/c/37013/ | x_refsource_CONFIRM x_transferred |
http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html | vendor-advisory x_refsource_SUSE x_transferred |
http://www.securitytracker.com/id/1031824 | vdb-entry x_refsource_SECTRACK x_transferred |
http://www.openwall.com/lists/oss-security/2015/02/22/4 | mailing-list x_refsource_MLIST x_transferred |
http://www.openwall.com/lists/oss-security/2015/02/22/8 | mailing-list x_refsource_MLIST x_transferred |
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/ | x_refsource_CONFIRM x_transferred |
http://www.debian.org/security/2015/dsa-3164 | vendor-advisory x_refsource_DEBIAN x_transferred |
The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 2.6 | LOW | AV:N/AC:H/Au:N/C:N/I:P/A:N |