Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-45232

EPSS 0.22% · P44
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-45232

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in powermail extension through 12.3.5 for TYPO3. It fails to validate the mail parameter of the confirmationAction, resulting in Insecure Direct Object Reference (IDOR). An unauthenticated attacker can use this to display the user-submitted data of all forms persisted by the extension. This can only be exploited when the extension is configured to save submitted form data to the database (plugin.tx_powermail.settings.db.enable=1), which however is the default setting of the extension. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
TYPO3 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TYPO3是瑞士TYPO3协会的一套免费开源的内容管理系统(框架)(CMS/CMF)。 TYPO3 存在安全漏洞,该漏洞源于无法验证确认操作的邮件参数,导致不安全的直接对象引用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-45232

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-45232

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-08-28 · 17 CVEs total

CVE-2024-426984.3 MEDIUMRoughly Enough Items 安全漏洞
CVE-2024-415644.3 MEDIUMEMI 安全漏洞
CVE-2024-415654.3 MEDIUMJustEnoughItems 安全漏洞
CVE-2024-34198TOTOLINK AC1200 安全漏洞
CVE-2024-42900RuoYi 安全漏洞
CVE-2023-45896Linux kernel 安全漏洞
CVE-2024-45233TYPO3 安全漏洞
CVE-2024-41236Kashipara Responsive School Management System 安全漏洞
CVE-2024-44760Shenzhou News Union Enterprise Management System 安全漏洞
CVE-2024-44913IrfanView 安全漏洞
CVE-2024-44915IrfanView 安全漏洞
CVE-2024-44914IrfanView 安全漏洞
CVE-2024-44761EQ Enterprise Management System 安全漏洞
CVE-2024-34195TOTOLINK AC1200 安全漏洞
CVE-2024-42905Digital China Networks DCME-320 安全漏洞
CVE-2024-42793Kashipara Music Management System 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2024-45232

No comments yet


Leave a comment