CVE-2021-32767
Summary
| CVE | CVE-2021-32767 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-07-20 16:15:00 UTC |
| Updated | 2021-09-21 16:29:00 UTC |
| Description | TYPO3 is an open source PHP based web content management system. In versions 9.0.0 through 9.5.27, 10.0.0 through 10.4.17, and 11.0.0 through 11.3.0, user credentials may been logged as plain-text. This occurs when explicitly using log level debug, which is not the default configuration. TYPO3 versions 9.5.28, 10.4.18, 11.3.1 contain a patch for this vulnerability. |
Risk And Classification
Problem Types: CWE-532
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Information Disclosure in User Authentication · Advisory · TYPO3/TYPO3.CMS · GitHub | CONFIRM | github.com | |
| TYPO3-CORE-SA-2021-012: Information Disclosure in User Authentication | MISC | typo3.org | |
| TYPO3-CORE-SA-2021-013: Cross-Site Scripting via Rich-Text Content | MISC | typo3.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.