An issue was discovered in powermail extension through 12.3.5 for TYPO3. It fails to validate the mail parameter of the confirmationAction, resulting in Insecure Direct Object Reference (IDOR). An unauthenticated attacker can use this to display the user-submitted data of all forms persisted by the extension. This can only be exploited when the extension is configured to save submitted form data to the database (plugin.tx_powermail.settings.db.enable=1), which however is the default setting of the extension. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://typo3.org/security/advisory/typo3-ext-sa-2024-006 |
History
Fri, 30 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
In2code
In2code powermail |
|
CPEs | cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:* | |
Vendors & Products |
In2code
In2code powermail |
Thu, 29 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Typo3
Typo3 typo3 |
|
Weaknesses | CWE-639 | |
CPEs | cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* | |
Vendors & Products |
Typo3
Typo3 typo3 |
|
Metrics |
cvssV3_1
|
Wed, 28 Aug 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in powermail extension through 12.3.5 for TYPO3. It fails to validate the mail parameter of the confirmationAction, resulting in Insecure Direct Object Reference (IDOR). An unauthenticated attacker can use this to display the user-submitted data of all forms persisted by the extension. This can only be exploited when the extension is configured to save submitted form data to the database (plugin.tx_powermail.settings.db.enable=1), which however is the default setting of the extension. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0 | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-08-28T00:00:00
Updated: 2024-08-29T13:16:40.783Z
Reserved: 2024-08-24T00:00:00
Link: CVE-2024-45232
Vulnrichment
Updated: 2024-08-29T13:14:36.763Z
NVD
Status : Analyzed
Published: 2024-08-29T00:15:09.177
Modified: 2024-08-30T16:34:39.270
Link: CVE-2024-45232
Redhat
No data.