Skip to main content

CVE-2022-47407: n/a in n/a

Medium
VulnerabilityCVE-2022-47407cvecve-2022-47407n-acwe-284
Published: Wed Dec 14 2022 (12/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in the fp_masterquiz (aka Master-Quiz) extension before 2.2.1, and 3.x before 3.5.1, for TYPO3. An attacker can continue the quiz of a different user. In doing so, the attacker can view that user's answers and modify those answers.

AI-Powered Analysis

AILast updated: 06/21/2025, 15:22:38 UTC

Technical Analysis

CVE-2022-47407 is a vulnerability identified in the fp_masterquiz (also known as Master-Quiz) extension for the TYPO3 content management system. This extension is used to create and manage quizzes within TYPO3-powered websites. The vulnerability affects versions prior to 2.2.1 and 3.x versions before 3.5.1. The core issue is an authorization flaw (CWE-284) that allows an attacker to continue a quiz session initiated by another user. Exploiting this flaw, the attacker can view the other user's quiz answers and modify them. This implies a failure in properly enforcing access controls to quiz sessions, allowing unauthorized access and modification of user-specific data. The vulnerability does not require known exploits in the wild as of the publication date, and no patch links were provided, indicating that remediation may require upgrading to the fixed versions or applying vendor-supplied patches once available. The vulnerability impacts confidentiality and integrity of user data within the quiz module but does not directly affect system availability or broader system integrity beyond the quiz context. The attack vector likely requires the attacker to have some level of access to the TYPO3 installation, such as being a logged-in user or having access to the quiz interface, but the exact authentication requirements are not specified. Given the nature of the vulnerability, it is primarily a logical access control flaw rather than a remote code execution or privilege escalation issue.

Potential Impact

For European organizations using TYPO3 with the fp_masterquiz extension, this vulnerability poses a risk to the confidentiality and integrity of user data collected via quizzes. Educational institutions, training providers, and businesses that rely on quizzes for assessments, certifications, or user engagement could see unauthorized disclosure and manipulation of quiz results. This could undermine trust in the platform, lead to data privacy concerns under GDPR, and potentially affect decision-making processes based on quiz outcomes. While the vulnerability does not directly compromise the entire TYPO3 system or underlying infrastructure, the ability to alter quiz answers could be exploited to falsify assessments or certifications, impacting organizational reputation and compliance. Since TYPO3 is widely used in Europe, especially in Germany and other central European countries, organizations in these regions are more likely to be affected. The lack of known exploits in the wild reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential abuse.

Mitigation Recommendations

Organizations should immediately identify TYPO3 installations using the fp_masterquiz extension and verify the version in use. Upgrading to version 2.2.1 or later for the 2.x branch, or 3.5.1 or later for the 3.x branch, is the primary mitigation step. If upgrading is not immediately possible, organizations should implement strict access controls around the quiz functionality, including limiting quiz access to authenticated and authorized users only. Additionally, monitoring and logging quiz session activities can help detect unauthorized access or modifications. Reviewing and hardening TYPO3 user permissions to ensure minimal necessary access to quiz modules is recommended. Since no patches were linked, organizations should stay alert for vendor updates or community patches. Finally, educating users and administrators about the risk and encouraging prompt application of updates will reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-12-14T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf79d0

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 3:22:38 PM

Last updated: 8/2/2025, 1:12:36 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats