Unrated severityNVD Advisory· Published Feb 23, 2015· Updated May 6, 2026
CVE-2015-2047
CVE-2015-2047
Description
The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.
Affected products
92cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*+ 90 more
- cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.22:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.23:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.24:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.25:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.26:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.27:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.28:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.29:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.30:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.31:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.32:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.33:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.34:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.35:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.36:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.37:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.38:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.39:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.4.15:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*
- cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/nvdVendor Advisory
- lists.opensuse.org/opensuse-updates/2016-08/msg00106.htmlnvd
- www.debian.org/security/2015/dsa-3164nvd
- www.openwall.com/lists/oss-security/2015/02/22/4nvd
- www.openwall.com/lists/oss-security/2015/02/22/8nvd
- www.securityfocus.com/bid/72763nvd
- www.securitytracker.com/id/1031824nvd
- review.typo3.orgnvd
News mentions
0No linked articles in our index yet.