← Back to CVEs
CVE-2021-32767
MEDIUM5.3
Description
TYPO3 is an open source PHP based web content management system. In versions 9.0.0 through 9.5.27, 10.0.0 through 10.4.17, and 11.0.0 through 11.3.0, user credentials may been logged as plain-text. This occurs when explicitly using log level debug, which is not the default configuration. TYPO3 versions 9.5.28, 10.4.18, 11.3.1 contain a patch for this vulnerability.
CVE Details
CVSS v3.1 Score5.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredLOW
User InteractionNONE
Published7/20/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
typo3:typo3
Weaknesses (CWE)
CWE-532CWE-532
References
https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-34fr-fhqr-7235(security-advisories@github.com)
https://typo3.org/security/advisory/typo3-core-sa-2021-012(security-advisories@github.com)
https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-34fr-fhqr-7235(af854a3a-2127-422b-91ae-364da2661108)
https://typo3.org/security/advisory/typo3-core-sa-2021-012(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.