Learn about CVE-2021-32767, a vulnerability affecting TYPO3.CMS versions 9.0.0 to 9.5.27, 10.0.0 to 10.4.17, and 11.0.0 to 11.3.0. Understand the impact, technical details, and mitigation steps.
This article provides detailed information about CVE-2021-32767, a vulnerability impacting TYPO3.CMS versions 9.0.0 to 9.5.27, 10.0.0 to 10.4.17, and 11.0.0 to 11.3.0.
Understanding CVE-2021-32767
This vulnerability relates to the disclosure of user credentials as plain text due to logging practices within TYPO3.CMS.
What is CVE-2021-32767?
In TYPO3.CMS versions specified, user credentials could be logged in plain text when using the debug log level.
The Impact of CVE-2021-32767
The vulnerability's impact is rated as medium severity with high confidentiality impact, highlighting the risk of user credentials exposure.
Technical Details of CVE-2021-32767
This section outlines the specific details related to the vulnerability.
Vulnerability Description
User credentials may be logged as plain-text when using log level debug.
Affected Systems and Versions
TYPO3.CMS versions between 9.0.0 to 9.5.27, 10.0.0 to 10.4.17, and 11.0.0 to 11.3.0 are affected.
Exploitation Mechanism
The vulnerability can be exploited by explicitly enabling the log level debug, exposing user credentials.
Mitigation and Prevention
Learn how to mitigate and prevent the risks associated with CVE-2021-32767.
Immediate Steps to Take
Upgrade to TYPO3.CMS versions 9.5.28, 10.4.18, or 11.3.1 which contain patches for this vulnerability.
Long-Term Security Practices
Ensure that debug logging configurations are carefully managed and avoid exposing sensitive information.
Patching and Updates
Regularly update TYPO3.CMS to the latest versions and follow security advisories for any future patches or fixes.