Skip to content

TYPO3 OpenID extension Open redirect vulnerability

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Aug 28, 2023

Package

composer friendsoftypo3/openid (Composer)

Affected versions

>= 4.5.0, < 4.5.31
>= 4.7.0, < 4.7.16
>= 6.0.0, < 6.0.11
>= 6.1.0, < 6.1.6

Patched versions

4.5.31
4.7.16
6.0.11
6.1.6

Description

Open redirect vulnerability in the OpenID extension in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

References

Published by the National Vulnerability Database Dec 23, 2013
Published to the GitHub Advisory Database May 17, 2022
Reviewed Aug 28, 2023
Last updated Aug 28, 2023

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(52nd percentile)

Weaknesses

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. Learn more on MITRE.

CVE ID

CVE-2013-7079

GHSA ID

GHSA-838c-v5cq-hp33

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.