mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
102 lines
3.5 KiB
JSON
102 lines
3.5 KiB
JSON
{
|
|
"id": "CVE-2024-47047",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-09-17T14:15:17.790",
|
|
"lastModified": "2024-09-27T17:03:35.507",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An issue was discovered in the powermail extension through 12.4.0 for TYPO3. It fails to validate the mail parameter of the createAction, resulting in Insecure Direct Object Reference (IDOR) in some configurations. An unauthenticated attacker can use this to display user-submitted data of all forms persisted by the extension. The fixed versions are 7.5.1, 8.5.1, 10.9.1, and 12.4.1."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubri\u00f3 un problema en la extensi\u00f3n Powermail hasta la versi\u00f3n 12.4.0 para TYPO3. No se puede validar el par\u00e1metro de correo de createAction, lo que genera una referencia directa a objetos insegura (IDOR) en algunas configuraciones. Un atacante no autenticado puede usar esto para mostrar los datos enviados por el usuario de todos los formatos que la extensi\u00f3n conserva. Las versiones corregidas son 7.5.1, 8.5.1, 10.9.1 y 12.4.1."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-639"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
|
|
"versionEndIncluding": "7.5.0",
|
|
"matchCriteriaId": "8764ACD9-5A01-41F0-8F16-D13BFCA129F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
|
|
"versionStartIncluding": "8.0.0",
|
|
"versionEndIncluding": "8.5.0",
|
|
"matchCriteriaId": "D925B424-6AEF-40FA-A4FF-BC562C3750CE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
|
|
"versionStartIncluding": "9.0.0",
|
|
"versionEndIncluding": "10.9.0",
|
|
"matchCriteriaId": "A215AF61-E0F4-45AC-83D6-1E3656711CD2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:in2code:powermail:*:*:*:*:*:typo3:*:*",
|
|
"versionStartIncluding": "12.0.0",
|
|
"versionEndIncluding": "12.4.0",
|
|
"matchCriteriaId": "810E82AE-D4B7-4EE0-BF02-4A0716C3667F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://typo3.org/security/advisory/typo3-ext-sa-2024-007",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |