- Component Type: TYPO3 CMS
- Subcomponent: Frontend Login (ext:felogin, ext:frontend)
- Release Date: December 13, 2022
- Vulnerability Type: Weak Authentication
- Affected Versions: 8.0.0-8.7.48, 9.0.0-9.5.37, 10.0.0-10.4.32, 11.0.0-11.5.19, 12.0.0-12.1.0
- Severity: Medium
- Suggested CVSS: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N/E:F/RL:O/RC:C
- References: CVE-2022-23501, CWE-302, CWE-1390
Problem Description
Restricting frontend login to specific users, organized in different storage folders (partitions), can be bypassed. A potential attacker might use this ambiguity in usernames to get access to a different account - however, credentials must be known to the adversary.
Solution
Update to TYPO3 versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.
Strong security defaults - Manual actions required
HTTP parameter pid has been enforced to be HMAC-signed, which might cause trouble in custom HTML templates or individual authentication services. Releases of TYPO3 versions 10.4.34 and 11.5.21 introduced the new feature flag security.frontend.enforceLoginSigning to adjust this behavior.
The technical changes that introduced the HMAC-signature are available in our review system for in-depth analysis.
Thanks to TYPO3 security team member Torben Hansen who reported this issue and to TYPO3 core & security team member Oliver Hader who fixed the issue.
General Advice
Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.
General Note
All security related code changes are tagged so that you can easily look them up in our review system.
- TYPO3-CORE-SA-2022-012: Denial of Service in Page Error Handling
- TYPO3-CORE-SA-2022-014: Insufficient Session Expiration after Password Reset