Skip to content

TYPO3 Authentication Bypass via Salted user password hashes extension

High severity GitHub Reviewed Published May 2, 2022 to the GitHub Advisory Database • Updated Feb 14, 2024
Withdrawn This advisory was withdrawn on Feb 14, 2024

Package

composer typo3/cms-saltedpasswords (Composer)

Affected versions

< 0.2.13

Patched versions

0.2.13

Description

Withdrawn: typo3/cms-saltedpasswords is not the correct package.
See: github/advisory-database#3488

The TYPO3 Security - Salted user password hashes (t3sec_saltedpw) extension before 0.2.13 for TYPO3 allows remote attackers to bypass authentication via unspecified vectors.

References

Published by the National Vulnerability Database Mar 19, 2010
Published to the GitHub Advisory Database May 2, 2022
Reviewed Feb 7, 2024
Last updated Feb 14, 2024
Withdrawn Feb 14, 2024

Severity

High

EPSS score

0.922%
(83rd percentile)

Weaknesses

CVE ID

CVE-2010-1022

GHSA ID

GHSA-cgr9-h9qq-x9fx
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.