High severityGHSA Advisory· Published Dec 13, 2023
Configuration Injection in extension "Direct Mail" (direct_mail)
CVE-2023-50461
Description
The “Configuration” backend module of the extension allows an authenticated user to write arbitrary page TSConfig for folders configured as “Direct Mail”. Exploiting the vulnerability may lead to Configuration Injection (TYPO3 10.4 and above) and to Arbitrary Code Execution (TYPO3 9.5 and below).
A valid backend user account having access to the Direct Mail "Configuration" backend module is needed in order to exploit this vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
directmailteam/direct-mailPackagist | >= 8.0.0, < 9.5.2 | 9.5.2 |
directmailteam/direct-mailPackagist | >= 7.0.0, < 7.0.3 | 7.0.3 |
directmailteam/direct-mailPackagist | < 6.0.3 | 6.0.3 |
Affected products
1- Range: < 6.0.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.