In TYPO3 CMS versions 10.4.0 and 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts. This has been fixed in 10.4.2.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2020-0405 | In TYPO3 CMS versions 10.4.0 and 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts. This has been fixed in 10.4.2. |
![]() |
GHSA-347x-877p-hcwx | Information Disclosure in Password Reset |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 03 Dec 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-03T19:08:03.534Z
Reserved: 2020-03-30T00:00:00
Link: CVE-2020-11063

No data.

Status : Modified
Published: 2020-05-13T23:15:11.047
Modified: 2024-12-03T20:15:13.003
Link: CVE-2020-11063

No data.

No data.