First published: Wed Aug 28 2024(Updated: )
An issue was discovered in powermail extension through 12.3.5 for TYPO3. Several actions in the OutputController can directly be called, due to missing or insufficiently implemented access checks, resulting in Broken Access Control. Depending on the configuration of the Powermail Frontend plugins, an unauthenticated attacker can exploit this to edit, update, delete, or export data of persisted forms. This can only be exploited when the Powermail Frontend plugins are used. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/in2code/powermail | >=11.0.0<12.4.0 | 12.4.0 |
composer/in2code/powermail | >=9.0.0<10.9.0 | 10.9.0 |
composer/in2code/powermail | >=8.0.0<8.5.0 | 8.5.0 |
composer/in2code/powermail | <7.5.0 | 7.5.0 |
In2code Powermail | <7.5.0 | |
In2code Powermail | >=8.0.0<8.5.0 | |
In2code Powermail | >=9.0.0<10.9.0 | |
In2code Powermail | >=12.0.0<12.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45233 has a critical severity level due to insufficient access control in the Powermail extension for TYPO3.
To fix CVE-2024-45233, update the Powermail extension to version 12.4.0 or later, or to version 10.9.0 or 8.5.0 as applicable.
CVE-2024-45233 affects Powermail versions between 7.0.0 and 12.3.5 inclusive.
CVE-2024-45233 is classified as a Broken Access Control vulnerability.
Yes, due to the flawed access checks, user data may be exposed to unauthorized actions.