Authorization Bypass Through User-Controlled Key Affecting in2code/powermail package, versions <7.5.0>=8.0.0, <8.5.0>=9.0.0, <10.9.0>=12.0.0, <12.4.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-IN2CODEPOWERMAIL-7843964
  • published28 Aug 2024
  • disclosed28 Aug 2024
  • creditChristian Pschorr, Oliver Hader

Introduced: 28 Aug 2024

CVE-2024-45232  (opens in a new tab)
CWE-639  (opens in a new tab)

How to fix?

Upgrade in2code/powermail to version 7.5.0, 8.5.0, 10.9.0, 12.4.0 or higher.

Overview

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key due to improper validation of the mail parameter of the confirmationAction, allowing an attacker to display user submitted data of all forms persisted by the extension.

NOTE:

This vulnerability can only be exploited, when the extension is configured to save submitted form data to the database (TypoScript constant: plugin.tx_powermail.settings.db.enable = 1), which however is the default setting of the extension.

CVSS Scores

version 4.0
version 3.1