2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-47411" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2022-12-14T21:15:14.753" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:31:54.523" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. Data about subscribers may be obtained via unsubscribeAction operations."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se descubri\u00f3 un problema en la extensi\u00f3n fp_newsletter (tambi\u00e9n conocida como administraci\u00f3n de suscriptores de boletines) antes de 1.1.1, 1.2.0, 2.x antes de 2.1.2, 2.2.1 hasta 2.4.0 y 3.x antes de 3.2.6 para TYPO3. Los datos sobre los suscriptores se pueden obtener mediante operaciones de acci\u00f3n de cancelaci\u00f3n de suscripci\u00f3n."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "cve@mitre.org" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" ,
"baseScore" : 9.1 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
2024-12-08 03:06:42 +00:00
"impactScore" : 5.2
2023-04-24 12:24:31 +02:00
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
2024-12-08 03:06:42 +00:00
"impactScore" : 3.6
2023-04-24 12:24:31 +02:00
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
2024-04-04 08:46:00 +00:00
"value" : "NVD-CWE-Other"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fp_newsletter_project:fp_newsletter:*:*:*:*:*:typo3:*:*" ,
"versionEndExcluding" : "1.1.1" ,
"matchCriteriaId" : "3A01A8AC-B433-49F5-9C1B-78ADEFD17221"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fp_newsletter_project:fp_newsletter:*:*:*:*:*:typo3:*:*" ,
"versionStartIncluding" : "2.0.0" ,
"versionEndExcluding" : "2.1.2" ,
"matchCriteriaId" : "9D5EBA94-84BE-489A-9BE6-7999CE067ECD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fp_newsletter_project:fp_newsletter:*:*:*:*:*:typo3:*:*" ,
"versionStartIncluding" : "2.2.1" ,
"versionEndIncluding" : "2.4.0" ,
"matchCriteriaId" : "9848D895-810D-4A6F-8838-976C42249CD9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fp_newsletter_project:fp_newsletter:*:*:*:*:*:typo3:*:*" ,
"versionStartIncluding" : "3.0.0" ,
"versionEndExcluding" : "3.2.6" ,
"matchCriteriaId" : "79C6D711-C890-4C96-BB9C-6F7CB74A2796"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fp_newsletter_project:fp_newsletter:1.2.0:*:*:*:*:typo3:*:*" ,
"matchCriteriaId" : "1F79BFEC-C393-48B6-821C-55106F7C9023"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://typo3.org/security/advisory/typo3-ext-sa-2022-017" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://typo3.org/security/advisory/typo3-ext-sa-2022-017" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}