LOW · 2.6

CVE-2015-2047

The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentic...

Vulnerability Description

The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.

CVSS Score

2.6

LOW

AV:N/AC:H/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
Typo3Typo34.3.0
DebianDebian Linux7.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-2047?

CVE-2015-2047 is a vulnerability with a CVSS score of 2.6 (LOW). The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentic...

How severe is CVE-2015-2047?

CVE-2015-2047 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-2047?

Check the references section above for vendor advisories and patch information. Affected products include: Typo3 Typo3, Debian Debian Linux.