Authorization Bypass Through User-Controlled Key Affecting in2code/powermail package, versions <7.5.0>=8.0.0, <8.5.0>=9.0.0, <10.9.0>=12.0.0, <12.4.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-IN2CODEPOWERMAIL-7843964
  • published28 Aug 2024
  • disclosed28 Aug 2024
  • creditChristian Pschorr, Oliver Hader

Introduced: 28 Aug 2024

CVE-2024-45232  (opens in a new tab)
CWE-639  (opens in a new tab)

How to fix?

Upgrade in2code/powermail to version 7.5.0, 8.5.0, 10.9.0, 12.4.0 or higher.

Overview

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key due to improper validation of the mail parameter of the confirmationAction, allowing an attacker to display user submitted data of all forms persisted by the extension.

NOTE:

This vulnerability can only be exploited, when the extension is configured to save submitted form data to the database (TypoScript constant: plugin.tx_powermail.settings.db.enable = 1), which however is the default setting of the extension.

CVSS Scores

version 4.0
version 3.1