// For flags

CVE-2022-31050

Insufficient Session Expiration in TYPO3 Admin Tool

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, Admin Tool sessions initiated via the TYPO3 backend user interface had not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.

TYPO3 es un sistema de administración de contenidos web de código abierto. En versiones anteriores a 9.5.34 ELTS, 10.4.29 y 11.5.11, las sesiones de la herramienta de administración iniciadas por medio de la interfaz de usuario del backend de TYPO3 no son revocadas aunque la cuenta de usuario correspondiente es degradado a permisos inferiores o es deshabilitado por completo. De esta manera, las sesiones en la herramienta de administración teóricamente podrían haberse prolongado sin ningún límite. TYPO3 versiones 9.5.34 ELTS, 10.4.29 y 11.5.11 contienen una corrección del problema

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-18 CVE Reserved
  • 2022-06-14 CVE Published
  • 2024-02-03 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-613: Insufficient Session Expiration
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Typo3
Search vendor "Typo3"
Typo3
Search vendor "Typo3" for product "Typo3"
>= 9.0.0 < 9.5.35
Search vendor "Typo3" for product "Typo3" and version " >= 9.0.0 < 9.5.35"
elts
Affected
Typo3
Search vendor "Typo3"
Typo3
Search vendor "Typo3" for product "Typo3"
>= 10.0.0 < 10.4.29
Search vendor "Typo3" for product "Typo3" and version " >= 10.0.0 < 10.4.29"
-
Affected
Typo3
Search vendor "Typo3"
Typo3
Search vendor "Typo3" for product "Typo3"
>= 11.0.0 < 11.5.11
Search vendor "Typo3" for product "Typo3" and version " >= 11.0.0 < 11.5.11"
-
Affected