Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. in2code/powermail
  4. ›
  5. CVE-2024-45232

CVE-2024-45232: "powermail" (powermail) Insecure Direct Object Reference (IDOR)

August 29, 2024

An issue was discovered in powermail extension through 12.3.5 for TYPO3. It fails to validate the mail parameter of the confirmationAction, resulting in Insecure Direct Object Reference (IDOR). An unauthenticated attacker can use this to display the user-submitted data of all forms persisted by the extension. This can only be exploited when the extension is configured to save submitted form data to the database (plugin.tx_powermail.settings.db.enable=1), which however is the default setting of the extension. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0.

References

  • github.com/FriendsOfPHP/security-advisories/blob/master/in2code/powermail/CVE-2024-45232.yaml
  • github.com/advisories/GHSA-p652-xcgx-f85m
  • github.com/in2code-de/powermail
  • github.com/in2code-de/powermail/commit/061756732357206f2f13bf39a0676dd266ec9586
  • github.com/in2code-de/powermail/commit/ac402d4972c77dd119c8db6ffe594c15e8ae0bc5
  • github.com/in2code-de/powermail/commit/e2ddfaa06d29019d60be02b5a3da04b237ed760b
  • github.com/in2code-de/powermail/commit/f58d70311799ae5f6acbec52ea9206d21eba91bb
  • nvd.nist.gov/vuln/detail/CVE-2024-45232
  • typo3.org/security/advisory/typo3-ext-sa-2024-006

Code Behaviors & Features

Detect and mitigate CVE-2024-45232 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 7.5.0, all versions starting from 8.0.0 before 8.5.0, all versions starting from 9.0.0 before 10.9.0, all versions starting from 11.0.0 before 12.4.0

Fixed versions

  • 12.4.0
  • 10.9.0
  • 8.5.0
  • 7.5.0

Solution

Upgrade to versions 10.9.0, 12.4.0, 7.5.0, 8.5.0 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-639: Authorization Bypass Through User-Controlled Key

Source file

packagist/in2code/powermail/CVE-2024-45232.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:32 +0000.