Lucene search

K
githubGitHub Advisory DatabaseGHSA-F683-35W9-28G5
HistoryDec 14, 2022 - 9:30 p.m.

Multiple vulnerabilities in extension "Newsletter subscriber management" (fp_newsletter)

2022-12-1421:30:16
CWE-863
GitHub Advisory Database
github.com
8
extension
newsletter subscriber
captcha
bypassed
automated
creation
newsletter
subscribers
arbitrary
subscription
uids
deleteaction
unsubscribed
access
checks
createaction
unsubscribeaction
data
existing

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

50.6%

The CAPTCHA of the extension can be bypassed which may result in automated creation of various newsletter subscribers. It is possible to provide arbitrary subscription UIDs to the deleteAction of the extension resulting in all newsletter subscribers to be unsubscribed. Insufficient access checks in the createAction and unsubscribeAction can be used to obtain data of existing newsletter subscribers.

Affected configurations

Vulners
Node
fixpunktfp-newsletterRange<1.1.1
OR
fixpunktfp-newsletterRange<2.1.2
OR
fixpunktfp-newsletterRange<3.2.6

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

50.6%