fkie_cve-2015-2047
Vulnerability from fkie_nvd
Published
2015-02-23 17:59
Modified
2025-04-12 10:46
Severity ?
Summary
The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.
Impacted products
Vendor Product Version
typo3 typo3 4.3.0
typo3 typo3 4.3.1
typo3 typo3 4.3.2
typo3 typo3 4.3.3
typo3 typo3 4.3.4
typo3 typo3 4.3.5
typo3 typo3 4.3.6
typo3 typo3 4.3.7
typo3 typo3 4.3.8
typo3 typo3 4.3.9
typo3 typo3 4.3.10
typo3 typo3 4.3.11
typo3 typo3 4.3.12
typo3 typo3 4.3.13
typo3 typo3 4.3.14
typo3 typo3 4.4.0
typo3 typo3 4.4.1
typo3 typo3 4.4.2
typo3 typo3 4.4.3
typo3 typo3 4.4.4
typo3 typo3 4.4.5
typo3 typo3 4.4.6
typo3 typo3 4.4.7
typo3 typo3 4.4.8
typo3 typo3 4.4.9
typo3 typo3 4.4.10
typo3 typo3 4.4.11
typo3 typo3 4.4.12
typo3 typo3 4.4.13
typo3 typo3 4.4.14
typo3 typo3 4.4.15
typo3 typo3 4.5.0
typo3 typo3 4.5.1
typo3 typo3 4.5.2
typo3 typo3 4.5.3
typo3 typo3 4.5.4
typo3 typo3 4.5.5
typo3 typo3 4.5.6
typo3 typo3 4.5.7
typo3 typo3 4.5.8
typo3 typo3 4.5.9
typo3 typo3 4.5.10
typo3 typo3 4.5.11
typo3 typo3 4.5.12
typo3 typo3 4.5.13
typo3 typo3 4.5.14
typo3 typo3 4.5.15
typo3 typo3 4.5.16
typo3 typo3 4.5.17
typo3 typo3 4.5.18
typo3 typo3 4.5.19
typo3 typo3 4.5.20
typo3 typo3 4.5.21
typo3 typo3 4.5.22
typo3 typo3 4.5.23
typo3 typo3 4.5.24
typo3 typo3 4.5.25
typo3 typo3 4.5.26
typo3 typo3 4.5.27
typo3 typo3 4.5.28
typo3 typo3 4.5.29
typo3 typo3 4.5.30
typo3 typo3 4.5.31
typo3 typo3 4.5.32
typo3 typo3 4.5.33
typo3 typo3 4.5.34
typo3 typo3 4.5.35
typo3 typo3 4.5.36
typo3 typo3 4.5.37
typo3 typo3 4.5.38
typo3 typo3 4.5.39
typo3 typo3 4.6
typo3 typo3 4.6.0
typo3 typo3 4.6.1
typo3 typo3 4.6.2
typo3 typo3 4.6.3
typo3 typo3 4.6.4
typo3 typo3 4.6.5
typo3 typo3 4.6.6
typo3 typo3 4.6.7
typo3 typo3 4.6.8
typo3 typo3 4.6.9
typo3 typo3 4.6.10
typo3 typo3 4.6.11
typo3 typo3 4.6.12
typo3 typo3 4.6.13
typo3 typo3 4.6.14
typo3 typo3 4.6.15
typo3 typo3 4.6.16
typo3 typo3 4.6.17
typo3 typo3 4.6.18
debian debian_linux 7.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6066CFA2-202E-43A3-B1DF-36364ABD5A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C922A9-05A3-4D98-A568-F780CCA87E39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "44E9893A-2771-4C04-9F90-B10EE659088E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "31DA3600-C955-46B0-8BD9-C9B3FC0B81EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7ED0C04-33BA-4F9B-97B0-BB5D30C2A0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E40CC0D-E7EF-4800-AC0B-5AF603B8BC6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "16759F16-34C6-4C2C-BECB-12555EEEBDA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB331CC-3125-454E-BCBE-B85540B62110",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B46AB0-D925-4E74-8D15-40EE3BC0B14A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "096ADAEC-A159-466C-BCD1-B12CFF5CF084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8074D252-259A-4D13-8CBF-A43EAB9DFA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB8879-0291-46B0-9C23-A7AC20700159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBA1F149-3D43-4AA1-BC4A-00EF3C895993",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C937A92-045D-4767-8EB2-E8BBB466FA86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "216C3E04-C772-4DF8-A0E0-11CFDC4E1DD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A60F86FA-B7D3-4BE5-82F2-05F2A5F5663D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9319A96-D510-47DB-9DBC-C16C0947E4C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E0FDF1-E63C-48C9-98E2-55E3FD891882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D22400-E6A1-4C3A-B16F-E14672B86D14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFA0996-4839-4FDB-9B9D-5F8424946F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "436C3A0C-CC01-483D-A188-6406CEE13796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CDB1BFC-B45C-4A2A-8F9B-1E593BCD4EB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "027BCB88-BBFF-46DA-A59A-35412EBF3008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4947CFBF-BA7A-460E-B716-D3EA85E19290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA8B097-5588-4F05-A882-1167EEB71178",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CB88EB-DED5-4875-A986-CB57C2092270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E906CAAC-2337-4C4C-A2CB-B1B430575A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C43E7D85-9570-40E0-83C3-5BB4B59340D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "098B2DC5-EC2A-4955-9CD0-FD26750971E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B505B1B-A555-459A-964F-59E3B093D420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83F54FE-B72E-4415-B29B-3D398E583AED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6523E669-DD41-4A28-A4D4-83CC8BE0143B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "868534F5-9CEE-48F8-BD2F-EDD8F9F5D302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD9A9F1-28EA-4B39-9D2D-74E7F86B1355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2B855F-5281-4DE6-A3C2-F579FDE5FD60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F773E8B-F81C-4A04-8A78-0576CB899A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2B48937-411B-468D-B35C-73BA0DCE7A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "867200CE-C689-4E6F-9D56-565B6D841494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EDD9F0-BBE2-4A79-B1A1-6CD31939A5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAEAFB6-4FA3-4586-A7D6-ED269433220A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDAE81E-15AD-4C1D-8989-9EFA6445885F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D451E97C-061F-43D3-B3B3-FD46C694C934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E8DF53F-3E5A-485E-8430-348207EBFF81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC68F0F3-89BC-4398-95EE-6358094B284B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "28352CAB-EF6C-43DC-9487-202151B18612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "635C90E5-BBCE-4662-BC16-4F04FCE04785",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "32D324F6-E73B-4F54-A4B1-431550C08341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "96AC3681-104E-4A33-B9F7-F648DB4B8193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE92575-D6F5-4304-8347-19E75EA35331",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F1954F5-A6EF-4A95-976E-5295197EEB2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "71834B10-8897-466C-9B2E-21FC04400540",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB69F7E9-001D-42B3-BEB4-B294737AD27B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E8530B-0311-45AA-92B4-6FF2CE388E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53B9001-C5B4-4D19-A314-118E3A292346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "E663FE0B-B509-4427-A2A0-9EB53E26810F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FA36C35-E9BD-4ED2-B6CB-950D641678E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A54839-425D-4D28-8AD2-479A593474FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "83542527-9738-46C0-A4D2-D5E2E203CD49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B68AE9-081A-4BE0-A2AF-969216D26637",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "253A3E84-401E-4F9F-8A9A-B8C464C69929",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "08742759-FFC8-4908-B319-4EC279C6AB74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC4B4B3F-D7BE-493C-ABF6-416FF89C4A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "36748261-81EF-4E39-8EC5-A67F054B623F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "21CC1BD2-CB44-4C0F-8B87-6272AEEBDEAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7129E4A-834D-4405-853B-89F1BD7965E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "E80654F2-42D2-4E47-B069-126327B83C7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AABC3190-44FF-4F75-BBA6-CE9D1BAC4096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ADA397D-D126-456C-BE3B-D129197CEA19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A7399A6-3078-458B-BF84-39081214BC13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "24D7D3E2-00DF-4F93-8978-24EAFAA6A916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.5.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B33260-D028-4D09-AAED-DF1004DB5930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D42D56A-2A1D-4FAA-961D-304E916BEF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "88CBAAC7-5207-45E8-86D5-18D98259070D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FAAF258-882A-46AE-B32C-7569A79C1DAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFB6F1E7-351D-45E7-9571-2AF4283080DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2B3B4A9-BDC7-4426-98FB-398B63AF3D18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0016A078-1291-4281-BA62-5A846AEE7584",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11DB8A8-8309-4FC9-BA35-1AFFC5B4AE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9661D2DB-F24C-478B-B691-303D48D9B158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F1FD6B9-7FAC-4508-962A-99AF63EB4B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "14369AD5-2622-4530-BCD5-A95C032CE4CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7CBAD29-18E9-4097-88FA-4D287A9A877A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F5144AE-E076-48B5-9EA3-2F0BEC34D92F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "46246047-B415-437A-AC0E-2A7157D47C17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C98937C-C769-40C9-841F-D9F0A49AAE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7C54D4-B953-442F-99A8-96B505C15DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "495B1280-1C65-45FE-B5C5-ED1BD7AF429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A6CE19A-3985-45AC-9DF5-64572AA9ECC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EA8422F-5A4B-4696-AF31-F1128FCF482F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EA625B3-16A2-436F-A63D-0B5200BAA955",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:typo3:typo3:4.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "13FE26EF-79DC-4907-A593-414679AAE9B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value."
    },
    {
      "lang": "es",
      "value": "La extensi\u00f3n rsaauth en TYPO3 4.3.0 hasta 4.3.14, 4.4.0 hasta 4.4.15, 4.5.0 hasta 4.5.39, y 4.6.0 hasta 4.6.18, cuando est\u00e1 configurado para el frontend, permite a atacantes remotos evadir la autenticaci\u00f3n a trav\u00e9s de una contrase\u00f1a que est\u00e1 asignado a un valor vac\u00edo."
    }
  ],
  "id": "CVE-2015-2047",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-02-23T17:59:03.667",
  "references": [
    {
      "source": "security@debian.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2015/dsa-3164"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.openwall.com/lists/oss-security/2015/02/22/4"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.openwall.com/lists/oss-security/2015/02/22/8"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/bid/72763"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securitytracker.com/id/1031824"
    },
    {
      "source": "security@debian.org",
      "url": "https://review.typo3.org/#/c/37013/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2015/02/22/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2015/02/22/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/72763"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1031824"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://review.typo3.org/#/c/37013/"
    }
  ],
  "sourceIdentifier": "security@debian.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…