- Component Type: TYPO3 CMS
- Vulnerable subcomponent: Salted Passwords (ext:saltedpasswords)
- Release Date: July 12, 2018
- Vulnerability Type: Authentication Bypass
- Affected Versions: 7.0.0 to 7.6.29, 8.0.0 to 8.7.16 and 9.0.0 to 9.3.0
- Severity: None - Critical (depending on the default hashing algorithm)
- Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C/CDP:ND/TD:L/CR:ND/IR:ND/AR:ND
- CVE: not assigned yet
It has been discovered that TYPO3’s Salted Password system extension (which is a mandatory system component) is vulnerable to Authentication Bypass when using hashing methods which are related by PHP class inheritance. In standard TYPO3 core distributions stored passwords using the blowfish hashing algorithm can be overridden when using MD5 as the default hashing algorithm by just knowing a valid username. Per default the Portable PHP hashing algorithm (PHPass) is used which is not vulnerable.
Update to TYPO3 versions 7.6.30, 8.7.17 or 9.3.1 that fix the problem described.
Thanks to TYPO3 core team member Oliver Hader who reported and fixed the issue.
Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.
All security related code changes are tagged so that you can easily look them up in our review system.