Lucene search

K
typo3TYPO3 AssociationTYPO3-EXT-SA-2014-004
HistoryFeb 12, 2014 - 12:00 a.m.

Mass Assignment in extension Direct Mail Subscription (direct_mail_subscription)

2014-02-1200:00:00
TYPO3 Association
typo3.org
130

0.002 Low

EPSS

Percentile

53.4%

It has been discovered that the extension “Direct Mail Subscription” (direct_mail_subscription) is susceptible to Mass Assignment.

Release Date: February 12, 2014

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: Version 2.0.0 and below

Vulnerability Type: Mass Assignment

Severity: Medium

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:O/RC:C (What’s that?)

Problem Description: The extension Direct Mail Subscription bundles a vulnerable version of the old the feuser_adminLib.inc library. This means that any links for creating records generated by this library can be manipulated to fill any field in the configured database table with arbitrary values. An attack is not limited to the fields listed in the configuration or the link itself.

Related CVE: CVE-2013-7075

Solution: An updated version 2.0.1 is available from the TYPO3 extension manager and at <http://typo3.org/extensions/repository/download/direct_mail_subscription/2.0.1/t3x/&gt;. Users of the extension are advised to update the extension as soon as possible.

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.

CPENameOperatorVersion
direct_mail_subscriptionle2.0.0

0.002 Low

EPSS

Percentile

53.4%