SB2020051515 - Multiple vulnerabilities in Direct Mail extension for TYPO3



SB2020051515 - Multiple vulnerabilities in Direct Mail extension for TYPO3

Published: May 15, 2020 Updated: May 15, 2020

Security Bulletin ID SB2020051515
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2020-12700)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the extension fails to check if an authenticated backend user has access to pages with newsletter subscriber data when using the "Special query" feature. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.


2) Open redirect (CVE-ID: CVE-2020-12699)

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data in "jumpUrl". A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.


3) Information disclosure (CVE-ID: CVE-2020-12698)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the extension fails to check if an authenticated backend user has access to newsletter subscriber tables when using the CSV export function of the extension. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.


4) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2020-12697)

The vulnerability allows a remote attacker to perofrm a denial of service (DoS) attack.

The vulnerability exists due to a functionality to log clicks on links in sent newsletters does not limit the amount of log entries generated per link. A remote attacker can use a valid link to fill the log table with a huge amount of records and cause a denial of service condition on the target system. 


Remediation

Install update from vendor's website.