Multiple vulnerabilities in Direct Mail extension for TYPO3



Published: 2020-05-15
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2020-12700
CVE-2020-12699
CVE-2020-12698
CVE-2020-12697
CWE-ID CWE-200
CWE-601
CWE-770
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Direct Mail
Web applications / Modules and components for CMS

Vendor TYPO3

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Information disclosure

EUVDB-ID: #VU27942

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12700

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the extension fails to check if an authenticated backend user has access to pages with newsletter subscriber data when using the "Special query" feature. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Direct Mail: 1.0.8 - 5.2.3

External links

http://typo3.org/help/security-advisories
http://typo3.org/security/advisory/typo3-ext-sa-2020-005


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Open redirect

EUVDB-ID: #VU27941

Risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12699

CWE-ID: CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')

Exploit availability: No

Description

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data in "jumpUrl". A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Direct Mail: 1.0.8 - 5.2.3

External links

http://typo3.org/help/security-advisories
http://typo3.org/security/advisory/typo3-ext-sa-2020-005


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Information disclosure

EUVDB-ID: #VU27940

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12698

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the extension fails to check if an authenticated backend user has access to newsletter subscriber tables when using the CSV export function of the extension. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Direct Mail: 1.0.8 - 5.2.3

External links

http://typo3.org/help/security-advisories
http://typo3.org/security/advisory/typo3-ext-sa-2020-005


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Allocation of Resources Without Limits or Throttling

EUVDB-ID: #VU27939

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12697

CWE-ID: CWE-770 - Allocation of Resources Without Limits or Throttling

Exploit availability: No

Description

The vulnerability allows a remote attacker to perofrm a denial of service (DoS) attack.

The vulnerability exists due to a functionality to log clicks on links in sent newsletters does not limit the amount of log entries generated per link. A remote attacker can use a valid link to fill the log table with a huge amount of records and cause a denial of service condition on the target system. 

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Direct Mail: 1.0.8 - 5.2.3

External links

http://typo3.org/help/security-advisories
http://typo3.org/security/advisory/typo3-ext-sa-2020-005


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###