
We found results for “”
CVE-2024-55891
Good to know:

Date: January 14, 2025
TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Insertion of Sensitive Information into Log File
CWE-532Top Fix

Upgrade Version
Upgrade to version typo3/cms-install - v13.4.3;typo3/cms - dev-l10n_main;typo3/cms - v13.4.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |