Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2020-12700 CVE-2020-12699 CVE-2020-12698 CVE-2020-12697 |
CWE-ID | CWE-200 CWE-601 CWE-770 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Direct Mail Web applications / Modules and components for CMS |
Vendor | TYPO3 |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU27942
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-12700
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the extension fails to check if an authenticated backend user has access to pages with newsletter subscriber data when using the "Special query" feature. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsDirect Mail: 1.0.8 - 5.2.3
External linkshttp://typo3.org/help/security-advisories
http://typo3.org/security/advisory/typo3-ext-sa-2020-005
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU27941
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-12699
CWE-ID:
CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to redirect victims to arbitrary URL.
The vulnerability exists due to improper sanitization of user-supplied data in "jumpUrl". A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
MitigationInstall updates from vendor's website.
Vulnerable software versionsDirect Mail: 1.0.8 - 5.2.3
External linkshttp://typo3.org/help/security-advisories
http://typo3.org/security/advisory/typo3-ext-sa-2020-005
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU27940
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-12698
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the extension fails to check if an authenticated backend user has access to newsletter subscriber tables when using the CSV export function of the extension. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsDirect Mail: 1.0.8 - 5.2.3
External linkshttp://typo3.org/help/security-advisories
http://typo3.org/security/advisory/typo3-ext-sa-2020-005
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU27939
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-12697
CWE-ID:
CWE-770 - Allocation of Resources Without Limits or Throttling
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perofrm a denial of service (DoS) attack.
The vulnerability exists due to a functionality to log clicks on links in sent newsletters does not limit the amount of log entries generated per link. A remote attacker can use a valid link to fill the log table with a huge amount of records and cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsDirect Mail: 1.0.8 - 5.2.3
External linkshttp://typo3.org/help/security-advisories
http://typo3.org/security/advisory/typo3-ext-sa-2020-005
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.