Lucene search

K
vulnrichmentMitreVULNRICHMENT:CVE-2024-45232
HistoryAug 28, 2024 - 12:00 a.m.

CVE-2024-45232

2024-08-2800:00:00
mitre
github.com
2
typo3
powermail extension
vulnerability

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

An issue was discovered in powermail extension through 12.3.5 for TYPO3. It fails to validate the mail parameter of the confirmationAction, resulting in Insecure Direct Object Reference (IDOR). An unauthenticated attacker can use this to display the user-submitted data of all forms persisted by the extension. This can only be exploited when the extension is configured to save submitted form data to the database (plugin.tx_powermail.settings.db.enable=1), which however is the default setting of the extension. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
    ],
    "vendor": "typo3",
    "product": "typo3",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "12.4.0",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "7.5.0"
      },
      {
        "status": "unaffected",
        "version": "8.5.0"
      },
      {
        "status": "unaffected",
        "version": "10.9.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-45232