CVE-2023-26436
Summary
| CVE | CVE-2023-26436 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-06-20 08:15:00 UTC |
| Updated | 2024-01-12 08:15:00 UTC |
| Description | Attackers with access to the "documentconverterws" API were able to inject serialized Java objects, that were not properly checked during deserialization. Access to this API endpoint is restricted to local networks by default. Arbitrary code could be injected that is being executed when processing the request. A check has been introduced to restrict processing of legal and expected classes for this API. We now log a warning in case there are attempts to inject illegal classes. No publicly available exploits are known. |
Risk And Classification
Problem Types: CWE-502
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Open-xchange | Open-xchange Appsuite Backend | All | All | All | All |
| Application | Open-xchange | Open-xchange Appsuite Backend | 7.10.6 | All | All | All |
| Application | Open-xchange | Open-xchange Appsuite Backend | 7.10.6 | revision_39 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 404 Not Found | MISC | documentation.open-xchange.com | |
| Full Disclosure: OXAS-ADV-2023-0002: OX App Suite Security Advisory | MISC | seclists.org | |
| OX App Suite SSRF / Resource Consumption / Command Injection ≈ Packet Storm | MISC | packetstormsecurity.com | |
| documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0002.json | documentation.open-xchange.com | ||
| software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.... | MISC | software.open-xchange.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.