CVE-2024-45233

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to directly call actions in the OutputController of the powermail TYPO3 extension, bypassing access controls. Attackers can edit, update, delete, or export persisted form data when Powermail Frontend plugins are configured. Only TYPO3 installations using affected powermail extension versions are impacted.

💻 Affected Systems

Products:
  • TYPO3 powermail extension
Versions: All versions through 12.3.5 (excluding fixed versions)
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only exploitable when Powermail Frontend plugins are configured and used. TYPO3 core is not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all form data managed by powermail, including sensitive user submissions, with potential data destruction or unauthorized data export.

🟠

Likely Case

Unauthorized modification or deletion of form submissions, potentially exposing sensitive user data collected through forms.

🟢

If Mitigated

No impact if powermail Frontend plugins are not used or if proper access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Direct action calls with no authentication required when Frontend plugins are configured.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.5.0, 8.5.0, 10.9.0, or 12.4.0 (depending on your major version)

Vendor Advisory: https://typo3.org/security/advisory/typo3-ext-sa-2024-006

Restart Required: No

Instructions:

1. Identify your powermail major version. 2. Update to the corresponding fixed version: 7.x → 7.5.0, 8.x → 8.5.0, 10.x → 10.9.0, 12.x → 12.4.0. 3. Clear TYPO3 caches after update.

🔧 Temporary Workarounds

Disable Powermail Frontend plugins

all

Temporarily disable all Powermail Frontend plugins in TYPO3 to prevent exploitation.

Edit TYPO3 page/content elements to disable powermail plugins

🧯 If You Can't Patch

  • Implement web application firewall rules to block direct calls to OutputController actions
  • Restrict access to TYPO3 frontend to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check powermail extension version in TYPO3 Extension Manager or composer.json. If version is below 7.5.0, 8.5.0, 10.9.0, or 12.4.0 (depending on major version), you are vulnerable.

Check Version:

composer show intext/powermail (for Composer installs) or check TYPO3 Extension Manager

Verify Fix Applied:

Confirm powermail extension version matches one of the fixed versions and test that OutputController actions now require proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unusual direct calls to powermail OutputController actions from unauthenticated users
  • Unexpected form data modifications or deletions

Network Indicators:

  • HTTP requests to powermail controller endpoints without authentication

SIEM Query:

web_access_logs WHERE uri CONTAINS 'powermail' AND uri CONTAINS 'OutputController' AND user_agent NOT IN (trusted_user_agents)

🔗 References

📤 Share & Export