Miggo Logo

CVE-2022-36106: TYPO3 CMS missing check for expiration time of password reset token for backend users

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.53144%
Published
9/16/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
typo3/cms-corecomposer>= 10.4.0, < 10.4.3210.4.32
typo3/cms-corecomposer>= 11.0.0, < 11.5.1611.5.16
typo3/cmscomposer>= 10.4.0, < 10.4.3210.4.32
typo3/cmscomposer>= 11.0.0, < 11.5.1611.5.16

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from missing expiration time validation in the token verification process. The patch adds an explicit check comparing $expirationTimestamp with the current time in findValidUserForToken. Since this was the only security-related code change shown in the commit diff and directly matches the vulnerability description, we can conclusively identify this function as the vulnerable component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

> ### M*t* > * *VSS: `*VSS:*.*/*V:N/**:L/PR:L/UI:N/S:U/*:L/I:L/*:N/*:*/RL:O/R*:*` (*.*) ### Pro*l*m It **s ***n *is*ov*r** t**t t** *xpir*tion tim* o* * p*sswor* r*s*t link *or TYPO* ***k*n* us*rs **s n*v*r ***n *v*lu*t**. *s * r*sult, * p*sswor* r*

Reasoning

T** vuln*r**ility st*mm** *rom missin* *xpir*tion tim* v*li**tion in t** tok*n v*ri*i**tion pro**ss. T** p*t** ***s *n *xpli*it ****k *omp*rin* $*xpir*tionTim*st*mp wit* t** *urr*nt tim* in *in*V*li*Us*r*orTok*n. Sin** t*is w*s t** only s**urity-r*l*