TYPO3 before 4.3.4 and 4.4.x before 4.4.1 contains insecure randomness during generation of a hash with the "forgot password" function.
References
Link | Resource |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 | Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2010-3670 | Third Party Advisory |
https://typo3.org/security/advisory/typo3-sa-2010-012/#Insecure_Randomness | Vendor Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 | Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2010-3670 | Third Party Advisory |
https://typo3.org/security/advisory/typo3-sa-2010-012/#Insecure_Randomness | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719 - Third Party Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2010-3670 - Third Party Advisory | |
References | () https://typo3.org/security/advisory/typo3-sa-2010-012/#Insecure_Randomness - Vendor Advisory |
Information
Published : 2019-11-05 20:15
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3670
Mitre link : CVE-2010-3670
CVE.ORG link : CVE-2010-3670
JSON object : View
Products Affected
typo3
- typo3
CWE
CWE-326
Inadequate Encryption Strength