Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTk1Mm0tbTgzYy0zeG02
Open redirect in direct_mail
The direct_mail extension through 5.2.3 for TYPO3 has an Open Redirect via jumpUrl.
Permalink: https://github.com/advisories/GHSA-952m-m83c-3xm6JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTk1Mm0tbTgzYy0zeG02
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 3 years ago
Updated: almost 2 years ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-952m-m83c-3xm6, CVE-2020-12699
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-12699
- https://typo3.org/help/security-advisories
- https://typo3.org/security/advisory/typo3-ext-sa-2020-005
- https://github.com/advisories/GHSA-952m-m83c-3xm6
Affected Packages
packagist:directmailteam/direct-mail
Dependent packages: 3Dependent repositories: 3
Downloads: 178,211 total
Affected Version Ranges: < 5.2.4
Fixed in: 5.2.4
All affected versions: 5.0.1, 5.1.0, 5.1.1, 5.2.0, 5.2.1, 5.2.2, 5.2.3
All unaffected versions: 5.2.4, 6.0.0, 6.0.1, 6.0.2, 6.0.4, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 9.0.0, 9.0.1, 9.0.2, 9.1.1, 9.1.2, 9.1.3, 9.2.0, 9.2.1, 9.2.2, 9.3.0, 9.4.0, 9.5.0, 9.5.1, 9.5.2