Vulnerability Details CVE-2015-2047
The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 72.2%
CVSS Severity
CVSS v2 Score 2.6
Products affected by CVE-2015-2047
-
cpe:2.3:a:typo3:typo3:4.3.0
-
cpe:2.3:a:typo3:typo3:4.3.1
-
cpe:2.3:a:typo3:typo3:4.3.10
-
cpe:2.3:a:typo3:typo3:4.3.11
-
cpe:2.3:a:typo3:typo3:4.3.12
-
cpe:2.3:a:typo3:typo3:4.3.13
-
cpe:2.3:a:typo3:typo3:4.3.14
-
cpe:2.3:a:typo3:typo3:4.3.2
-
cpe:2.3:a:typo3:typo3:4.3.3
-
cpe:2.3:a:typo3:typo3:4.3.4
-
cpe:2.3:a:typo3:typo3:4.3.5
-
cpe:2.3:a:typo3:typo3:4.3.6
-
cpe:2.3:a:typo3:typo3:4.3.7
-
cpe:2.3:a:typo3:typo3:4.3.8
-
cpe:2.3:a:typo3:typo3:4.3.9
-
cpe:2.3:a:typo3:typo3:4.4.0
-
cpe:2.3:a:typo3:typo3:4.4.1
-
cpe:2.3:a:typo3:typo3:4.4.10
-
cpe:2.3:a:typo3:typo3:4.4.11
-
cpe:2.3:a:typo3:typo3:4.4.12
-
cpe:2.3:a:typo3:typo3:4.4.13
-
cpe:2.3:a:typo3:typo3:4.4.14
-
cpe:2.3:a:typo3:typo3:4.4.15
-
cpe:2.3:a:typo3:typo3:4.4.2
-
cpe:2.3:a:typo3:typo3:4.4.3
-
cpe:2.3:a:typo3:typo3:4.4.4
-
cpe:2.3:a:typo3:typo3:4.4.5
-
cpe:2.3:a:typo3:typo3:4.4.6
-
cpe:2.3:a:typo3:typo3:4.4.7
-
cpe:2.3:a:typo3:typo3:4.4.8
-
cpe:2.3:a:typo3:typo3:4.4.9
-
cpe:2.3:a:typo3:typo3:4.5.0
-
cpe:2.3:a:typo3:typo3:4.5.1
-
cpe:2.3:a:typo3:typo3:4.5.10
-
cpe:2.3:a:typo3:typo3:4.5.11
-
cpe:2.3:a:typo3:typo3:4.5.12
-
cpe:2.3:a:typo3:typo3:4.5.13
-
cpe:2.3:a:typo3:typo3:4.5.14
-
cpe:2.3:a:typo3:typo3:4.5.15
-
cpe:2.3:a:typo3:typo3:4.5.16
-
cpe:2.3:a:typo3:typo3:4.5.17
-
cpe:2.3:a:typo3:typo3:4.5.18
-
cpe:2.3:a:typo3:typo3:4.5.19
-
cpe:2.3:a:typo3:typo3:4.5.2
-
cpe:2.3:a:typo3:typo3:4.5.20
-
cpe:2.3:a:typo3:typo3:4.5.21
-
cpe:2.3:a:typo3:typo3:4.5.22
-
cpe:2.3:a:typo3:typo3:4.5.23
-
cpe:2.3:a:typo3:typo3:4.5.24
-
cpe:2.3:a:typo3:typo3:4.5.25
-
cpe:2.3:a:typo3:typo3:4.5.26
-
cpe:2.3:a:typo3:typo3:4.5.27
-
cpe:2.3:a:typo3:typo3:4.5.28
-
cpe:2.3:a:typo3:typo3:4.5.29
-
cpe:2.3:a:typo3:typo3:4.5.3
-
cpe:2.3:a:typo3:typo3:4.5.30
-
cpe:2.3:a:typo3:typo3:4.5.31
-
cpe:2.3:a:typo3:typo3:4.5.32
-
cpe:2.3:a:typo3:typo3:4.5.33
-
cpe:2.3:a:typo3:typo3:4.5.34
-
cpe:2.3:a:typo3:typo3:4.5.35
-
cpe:2.3:a:typo3:typo3:4.5.36
-
cpe:2.3:a:typo3:typo3:4.5.37
-
cpe:2.3:a:typo3:typo3:4.5.38
-
cpe:2.3:a:typo3:typo3:4.5.39
-
cpe:2.3:a:typo3:typo3:4.5.4
-
cpe:2.3:a:typo3:typo3:4.5.5
-
cpe:2.3:a:typo3:typo3:4.5.6
-
cpe:2.3:a:typo3:typo3:4.5.7
-
cpe:2.3:a:typo3:typo3:4.5.8
-
cpe:2.3:a:typo3:typo3:4.5.9
-
cpe:2.3:a:typo3:typo3:4.6
-
cpe:2.3:a:typo3:typo3:4.6.0
-
cpe:2.3:a:typo3:typo3:4.6.1
-
cpe:2.3:a:typo3:typo3:4.6.10
-
cpe:2.3:a:typo3:typo3:4.6.11
-
cpe:2.3:a:typo3:typo3:4.6.12
-
cpe:2.3:a:typo3:typo3:4.6.13
-
cpe:2.3:a:typo3:typo3:4.6.14
-
cpe:2.3:a:typo3:typo3:4.6.15
-
cpe:2.3:a:typo3:typo3:4.6.16
-
cpe:2.3:a:typo3:typo3:4.6.17
-
cpe:2.3:a:typo3:typo3:4.6.18
-
cpe:2.3:a:typo3:typo3:4.6.2
-
cpe:2.3:a:typo3:typo3:4.6.3
-
cpe:2.3:a:typo3:typo3:4.6.4
-
cpe:2.3:a:typo3:typo3:4.6.5
-
cpe:2.3:a:typo3:typo3:4.6.6
-
cpe:2.3:a:typo3:typo3:4.6.7
-
cpe:2.3:a:typo3:typo3:4.6.8
-
cpe:2.3:a:typo3:typo3:4.6.9
-
cpe:2.3:o:debian:debian_linux:7.0