Custom log-in and log-out locations are used-defined as jslob but were not checked to contain malicious protocol handlers. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content for those locations to avoid redirects to malicious content. No publicly available exploits are known.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Aug/8 | Mailing List Third Party Advisory |
https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json | |
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf | Release Notes |
Configurations
History
No history.
Information
Published : 2023-08-02 13:15
Updated : 2024-01-12 08:15
NVD link : CVE-2023-26448
Mitre link : CVE-2023-26448
CVE.ORG link : CVE-2023-26448
JSON object : View
Products Affected
open-xchange
- open-xchange_appsuite_frontend
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')