The cacheservice API could be abused to inject parameters with SQL syntax which was insufficiently sanitized before getting executed as SQL statement. Attackers with access to a local or restricted network were able to perform arbitrary SQL queries, discovering other users cached data. We have improved the input check for API calls and filter for potentially malicious content. No publicly available exploits are known.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Aug/8 | Mailing List Third Party Advisory |
https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json | |
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf | Release Notes |
Configurations
History
No history.
Information
Published : 2023-08-02 13:15
Updated : 2024-01-12 08:15
NVD link : CVE-2023-26439
Mitre link : CVE-2023-26439
CVE.ORG link : CVE-2023-26439
JSON object : View
Products Affected
open-xchange
- open-xchange_appsuite_office
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')