TYPO3-EXT-SA-2019-004: Object Injection in extension "mkmailer" (mkmailer)

Categories: Development Created by Torben Hansen
It has been discovered that the extension "mkmailer" (mkmailer) is susceptible to Object Injection.
  • Release Date: January 22, 2019
  • Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
  • Vulnerability Type: Object Injection
  • Affected Versions:  3.0.9 and below 
  • Severity: High
  • Suggested CVSS v3.0: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
  • CVE: not assigned yet

Problem Description

It was discovered that included 3rd party library PHPMailer is prone to a PHP object injection vulnerability, potentially allowing a remote attacker to execute arbitrary code.

Solution

An updated version 3.0.10  is available from the TYPO3 extension manager and at https://typo3.org/extensions/repository/download/mkmailer/3.0.10/zip/
Users of the extension are advised to update the extension as soon as possible. 

Note: Versions 3.0.1 - 3.0.9 of the extension has been released on GitHub only, but are vulnerable too.

Credits

Thanks to Security Team Member Torben Hansen who reported the vulnerability.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.