Lucene search

K
typo3TYPO3 AssociationTYPO3-EXT-SA-2013-014
HistorySep 25, 2013 - 12:00 a.m.

Information Disclosure in extension Direct Mail (direct_mail)

2013-09-2500:00:00
TYPO3 Association
typo3.org
8

0.003 Low

EPSS

Percentile

69.5%

It has been discovered that the extension “Direct Mail” (direct mail) is susceptible to Information Disclosure

Release Date: September 25, 2013

Bulletin update: September 18, 2014 (added CVE)

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: Version 3.1.1 and below

Vulnerability Type: Information Disclosure

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:P/RL:O/RC:C (What’s that?)

CVE: CVE-2013-7400

Problem Description: Failing to check authentication codes properly, direct_mail exposes user data including the original authentication code.

Solution: An updated version 3.1.2 is available from the TYPO3 extension manager and at <http://typo3.org/extensions/repository/download/direct_mail/3.1.2/t3x/&gt;. Users of the extension are advised to update the extension as soon as possible.

Credits: Credits go to Bernhard Kraft who discovered and reported this issue.

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

CPENameOperatorVersion
direct_maille3.1.1

0.003 Low

EPSS

Percentile

69.5%

Related for TYPO3-EXT-SA-2013-014