CVE-2022-31047
low-risk
Published 2022-06-14
TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, system internal credentials or keys (e.g. database credentials) can be logged as plaintext in exception handlers, when logging the complete exception stack trace. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 contain a fix for the problem.
Do I need to act?
-
0.39% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ HIGH complexity
Affected Vendors
References (6)
Third Party Advisory
https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99
Vendor Advisory
https://typo3.org/security/advisory/typo3-core-sa-2022-002
Third Party Advisory
https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99
Vendor Advisory
https://typo3.org/security/advisory/typo3-core-sa-2022-002
25
/ 100
low-risk
Severity
17/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
7/34 · Low