Vulnerability Description
The direct_mail (aka Direct Mail) extension through 5.2.2 for TYPO3 has a missing access check in the backend module, allowing a user (with restricted permissions to the fe_users table) to view and export data of frontend users who are subscribed to a newsletter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dkd | Direct Mail | <= 5.2.2 |
Related Weaknesses (CWE)
References
- https://extensions.typo3.org/extension/direct_mailThird Party Advisory
- https://typo3.org/security/advisory/typo3-ext-sa-2019-016/Third Party Advisory
- https://extensions.typo3.org/extension/direct_mailThird Party Advisory
- https://typo3.org/security/advisory/typo3-ext-sa-2019-016/Third Party Advisory
FAQ
What is CVE-2019-16698?
CVE-2019-16698 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The direct_mail (aka Direct Mail) extension through 5.2.2 for TYPO3 has a missing access check in the backend module, allowing a user (with restricted permissions to the fe_users table) to view and ex...
How severe is CVE-2019-16698?
CVE-2019-16698 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-16698?
Check the references section above for vendor advisories and patch information. Affected products include: Dkd Direct Mail.