Vulnerability Description
The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typo3 | Typo3 | 4.3.0 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html
- http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015Vendor Advisory
- http://www.debian.org/security/2015/dsa-3164
- http://www.openwall.com/lists/oss-security/2015/02/22/4
- http://www.openwall.com/lists/oss-security/2015/02/22/8
- http://www.securityfocus.com/bid/72763
- http://www.securitytracker.com/id/1031824
- https://review.typo3.org/#/c/37013/
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html
- http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015Vendor Advisory
- http://www.debian.org/security/2015/dsa-3164
- http://www.openwall.com/lists/oss-security/2015/02/22/4
- http://www.openwall.com/lists/oss-security/2015/02/22/8
- http://www.securityfocus.com/bid/72763
- http://www.securitytracker.com/id/1031824
FAQ
What is CVE-2015-2047?
CVE-2015-2047 is a vulnerability with a CVSS score of 2.6 (LOW). The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentic...
How severe is CVE-2015-2047?
CVE-2015-2047 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-2047?
Check the references section above for vendor advisories and patch information. Affected products include: Typo3 Typo3, Debian Debian Linux.