CVE Vulnerabilities

CVE-2022-23502

Insufficient Session Expiration

Published: Dec 14, 2022 | Modified: Dec 16, 2022
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

TYPO3 is an open source PHP based web content management system. In versions prior to 10.4.33, 11.5.20, and 12.1.1, When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions. This issue is patched in versions 10.4.33, 11.5.20, 12.1.1.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Typo3 Typo3 10.0.0 (including) 10.4.33 (excluding)
Typo3 Typo3 11.0.0 (including) 11.5.20 (excluding)
Typo3 Typo3 12.0.0 (including) 12.1.1 (excluding)
Typo3-src Ubuntu trusty *
Typo3-src Ubuntu xenial *

Potential Mitigations

References