Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. typo3/cms
  4. ›
  5. CVE-2020-11063

CVE-2020-11063: Information Disclosure in Password Reset

May 13, 2020 (updated December 3, 2024)

In TYPO3 CMS 10.4.0 through 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts.

This has been fixed in 10.4.2.

References

  • github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2020-11063.yaml
  • github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2020-11063.yaml
  • github.com/TYPO3/typo3
  • github.com/TYPO3/typo3/commit/14929b98ecda0ce67329b0f25ca7c01ee85df574
  • github.com/TYPO3/typo3/security/advisories/GHSA-347x-877p-hcwx
  • github.com/advisories/GHSA-347x-877p-hcwx
  • nvd.nist.gov/vuln/detail/CVE-2020-11063
  • typo3.org/security/advisory/typo3-core-sa-2020-001

Code Behaviors & Features

Detect and mitigate CVE-2020-11063 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 10.0.0 before 10.4.2

Fixed versions

  • 10.4.2

Solution

Upgrade to version 10.4.2 or above.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-204: Observable Response Discrepancy

Source file

packagist/typo3/cms/CVE-2020-11063.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:33 +0000.