Name | CVE-2015-2047 |
Description | The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-3164-1 |
Debian Bugs | 778870 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
typo3-src | source | squeeze | (unfixed) | end-of-life | ||
typo3-src | source | wheezy | 4.5.19+dfsg1-5+wheezy4 | DSA-3164-1 | ||
typo3-src | source | (unstable) | 4.5.40+dfsg1-1 | 778870 |
[squeeze] - typo3-src <end-of-life> (Unsupported in squeeze-lts)
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/