| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2020-12699
Vulnerability Database
packagist
CVE-2020-12699
Base Score
MEDIUM
6.1
CVE-2020-12699
The direct_mail extension through 5.2.3 for TYPO3 has an Open Redirect via jumpUrl.
Vector
NETWORK
Published By
cve@mitre.org
Published Date
May 13, 2020, 13:15
Affected Versions
(1)
directmailteam/direct-mail
(Packagist)
Introduced
0
Fixed
5.2.4
Limit
N/A
Package (Ecosystem)
Introduced
Fixed
Limit
directmailteam/direct-mail
(Packagist)
0
5.2.4
N/A
Weakness Type (CWE)
:
CWE-601
CVSS Metrics
CVSS v3.1
CVSS v2
Base Score
6.1
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Base Severity
MEDIUM
Version
3.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality (C)
LOW
Integrity (I)
LOW
Availability (A)
NONE
References
https://typo3.org/help/security-advisories
https://typo3.org/security/advisory/typo3-ext-sa-2020-005
Base Score
MEDIUM
6.1
Weakness Type (CWE)
:
CWE-601
CVSS Metrics
CVSS v3.1
CVSS v2
Base Score
6.1
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Base Severity
MEDIUM
Version
3.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality (C)
LOW
Integrity (I)
LOW
Availability (A)
NONE