Lucene search

K
githubGitHub Advisory DatabaseGHSA-Q25C-R482-77P9
HistorySep 17, 2024 - 3:31 p.m.

powermail TYPO3 extension has Insecure Direct Object Reference

2024-09-1715:31:23
CWE-639
GitHub Advisory Database
github.com
1
powermail
typo3
extension
insecure direct object reference
idor
unauthenticated attacker
user-submitted data
configurations
fixed versions
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

37.7%

An issue was discovered in the powermail extension through 12.4.0 for TYPO3. It fails to validate the mail parameter of the createAction, resulting in Insecure Direct Object Reference (IDOR) in some configurations. An unauthenticated attacker can use this to display user-submitted data of all forms persisted by the extension. The fixed versions are 7.5.1, 8.5.1, 10.9.1, and 12.4.1.

Affected configurations

Vulners
Node
in2codepowermailRange12.0.012.4.1typo3
OR
in2codepowermailRange9.0.010.9.1typo3
OR
in2codepowermailRange8.0.08.5.1typo3
OR
in2codepowermailRange<7.5.1typo3
VendorProductVersionCPE
in2codepowermail*cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

37.7%

Related for GHSA-Q25C-R482-77P9