{"vulnerability": "CVE-2024-55891", "sightings": [{"uuid": "c72217a9-575f-45b9-9a1d-15878a74393e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55891", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfq2xasfvl2e", "content": "", "creation_timestamp": "2025-01-14T20:15:55.504799Z"}, {"uuid": "a103e881-2057-45e9-89ed-4e6d1903ab21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55891", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1758", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55891\n\ud83d\udd39 Description: TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-01-14T19:11:58.861Z\n\ud83d\udccf Modified: 2025-01-15T15:02:46.106Z\n\ud83d\udd17 References:\n1. https://github.com/TYPO3/typo3/security/advisories/GHSA-38x7-cc6w-j27q\n2. https://typo3.org/security/advisory/typo3-core-sa-2025-001", "creation_timestamp": "2025-01-15T15:10:06.000000Z"}, {"uuid": "7364fd4f-d2bf-449c-ac12-8e6ff5ade006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55891", "type": "seen", "source": "https://t.me/cvedetector/15369", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55891 - TYPO3 Install Tool Unprotected Password Log\", \n  \"Content\": \"CVE ID : CVE-2024-55891 \nPublished : Jan. 14, 2025, 8:15 p.m. | 37\u00a0minutes ago \nDescription : TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T22:23:01.000000Z"}]}