CVE-2023-26446
Summary
| CVE | CVE-2023-26446 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-02 13:15:00 UTC |
| Updated | 2024-01-12 08:15:00 UTC |
| Description | The users clientID at "application passwords" was not sanitized or escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the user-controllable clientID parameter. No publicly available exploits are known. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Open-xchange | Open-xchange Appsuite Frontend | All | All | All | All |
| Application | Open-xchange | Open-xchange Appsuite Frontend | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| OX App Suite SSRF / SQL Injection / Cross Site Scripting ≈ Packet Storm | MISC | packetstormsecurity.com | |
| documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json | documentation.open-xchange.com | ||
| documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json | MISC | documentation.open-xchange.com | |
| Full Disclosure: OXAS-ADV-2023-0003: OX App Suite Security Advisory | MISC | seclists.org | |
| software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.... | MISC | software.open-xchange.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.