---------------------------------------------------------------------- Accurate Vulnerability Scanning No more false positives, no more false negatives http://secunia.com/vulnerability_scanning/ ---------------------------------------------------------------------- TITLE: TYPO3 OpenID Identity Authentication Security Bypass SECUNIA ADVISORY ID: SA38206 VERIFY ADVISORY: http://secunia.com/advisories/38206/ DESCRIPTION: A security issue has been reported in TYPO3, which can be exploited by malicious people to bypass certain security restrictions. The security issue is caused due to an error in the system extension "openid" when using OpenID identities for authentication. This can be exploited to log in to the TYPO3 backend by using a backend user account's OpenID identity. Successful exploitation requires an enabled system extension "openid" (disabled by default), knowledge of the OpenID identity assigned to a TYPO3 backend user account, and that the attacker and victim have identities from the same OpenID provider. NOTE: Only OpenID identities from providers, who discard submitted OpenID identities and allow users to choose a different identity, are vulnerable. The security issue is reported in version 4.3.0. Prior versions may also be affected. SOLUTION: Update to version 4.3.1. PROVIDED AND/OR DISCOVERED BY: Jeff Segars, TYPO3 Core team. ORIGINAL ADVISORY: TYPO3-SA-2010-001: http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-001/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------