GHSA-c5mj-39cf-3pp5: TYPO3 Security Misconfiguration for Backend User Accounts
When using the TYPO3 backend in order to create new backend user accounts, database records containing insecure or empty credentials might be persisted. When the type of user account is changed - which might be entity type or the admin flag for backend users - the backend form is reloaded in order to reflect changed configuration possibilities. However, this leads to persisting the current state as well, which can result into some of the following:
- account contains empty login credentials (username and/or password)
- account is incomplete and contains weak credentials (username and/or password)
Albeit the functionality provided by the TYPO3 core cannot be used either with empty usernames or empty passwords, it still can be a severe vulnerability to custom authentication service implementations.
This weakness cannot be directly exploited and requires interaction on purpose by some backend user having according privileges.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2019-01-22-2.yaml
- github.com/TYPO3/typo3
- github.com/TYPO3/typo3/commit/b3608d14e1915030cde272000a247cb6d5f982b8
- github.com/TYPO3/typo3/commit/e4d0cff40a4f8f597e52c20fff529e206bb62703
- github.com/advisories/GHSA-c5mj-39cf-3pp5
- typo3.org/security/advisory/typo3-core-sa-2019-002
Detect and mitigate GHSA-c5mj-39cf-3pp5 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →