Control characters were not removed when exporting user feedback content. This allowed attackers to include unexpected content via user feedback and potentially break the exported data structure. We now drop all control characters that are not whitespace character during the export. No publicly available exploits are known.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Jun/8 | Mailing List Third Party Advisory |
https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0002.json | |
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf | Release Notes |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-06-20 08:15
Updated : 2024-01-12 08:15
NVD link : CVE-2023-26429
Mitre link : CVE-2023-26429
CVE.ORG link : CVE-2023-26429
JSON object : View
Products Affected
open-xchange
- open-xchange_appsuite_backend
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')