The "OX Count" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Aug/8 | Mailing List Third Party Advisory |
https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json | |
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf | Release Notes |
Configurations
History
No history.
Information
Published : 2023-08-02 13:15
Updated : 2024-01-12 08:15
NVD link : CVE-2023-26450
Mitre link : CVE-2023-26450
CVE.ORG link : CVE-2023-26450
JSON object : View
Products Affected
open-xchange
- open-xchange_appsuite_frontend
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')