2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-47410" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2022-12-14T21:15:14.540" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:31:54.370" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. Data about subscribers may be obtained via createAction operations."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se descubri\u00f3 un problema en la extensi\u00f3n fp_newsletter (tambi\u00e9n conocida como administraci\u00f3n de suscriptores de boletines) antes de 1.1.1, 1.2.0, 2.x antes de 2.1.2, 2.2.1 hasta 2.4.0 y 3.x antes de 3.2.6 para TYPO3. Los datos sobre los suscriptores se pueden obtener mediante operaciones createAction."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "cve@mitre.org" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" ,
"baseScore" : 9.1 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
2024-12-08 03:06:42 +00:00
"impactScore" : 5.2
2023-04-24 12:24:31 +02:00
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
2024-12-08 03:06:42 +00:00
"impactScore" : 3.6
2023-04-24 12:24:31 +02:00
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
2024-04-04 08:46:00 +00:00
"value" : "NVD-CWE-Other"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fp_newsletter_project:fp_newsletter:*:*:*:*:*:typo3:*:*" ,
"versionEndExcluding" : "1.1.1" ,
"matchCriteriaId" : "3A01A8AC-B433-49F5-9C1B-78ADEFD17221"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fp_newsletter_project:fp_newsletter:*:*:*:*:*:typo3:*:*" ,
"versionStartIncluding" : "2.0.0" ,
"versionEndExcluding" : "2.1.2" ,
"matchCriteriaId" : "9D5EBA94-84BE-489A-9BE6-7999CE067ECD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fp_newsletter_project:fp_newsletter:*:*:*:*:*:typo3:*:*" ,
"versionStartIncluding" : "2.2.1" ,
"versionEndIncluding" : "2.4.0" ,
"matchCriteriaId" : "9848D895-810D-4A6F-8838-976C42249CD9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fp_newsletter_project:fp_newsletter:*:*:*:*:*:typo3:*:*" ,
"versionStartIncluding" : "3.0.0" ,
"versionEndExcluding" : "3.2.6" ,
"matchCriteriaId" : "79C6D711-C890-4C96-BB9C-6F7CB74A2796"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fp_newsletter_project:fp_newsletter:1.2.0:*:*:*:*:typo3:*:*" ,
"matchCriteriaId" : "1F79BFEC-C393-48B6-821C-55106F7C9023"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://typo3.org/security/advisory/typo3-ext-sa-2022-017" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://typo3.org/security/advisory/typo3-ext-sa-2022-017" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}