CVE-2023-26451
Summary
| CVE | CVE-2023-26451 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-02 13:15:00 UTC |
| Updated | 2024-01-12 07:15:00 UTC |
| Description | Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly available exploits are known. |
Risk And Classification
Problem Types: CWE-330
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Open-xchange | Open-xchange Appsuite Backend | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| OX App Suite SSRF / SQL Injection / Cross Site Scripting ≈ Packet Storm | MISC | packetstormsecurity.com | |
| documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json | documentation.open-xchange.com | ||
| documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json | MISC | documentation.open-xchange.com | |
| Full Disclosure: OXAS-ADV-2023-0003: OX App Suite Security Advisory | MISC | seclists.org | |
| software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.... | MISC | software.open-xchange.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.