{"api_version":"1","generated_at":"2026-05-01T04:44:38+00:00","cve":"CVE-2023-26448","urls":{"html":"https://cve.report/CVE-2023-26448","api":"https://cve.report/api/cve/CVE-2023-26448.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-26448","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-26448"},"summary":{"title":"CVE-2023-26448","description":"Custom log-in and log-out locations are used-defined as jslob but were not checked to contain malicious protocol handlers. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content for those locations to avoid redirects to malicious content. No publicly available exploits are known.","state":"PUBLIC","assigner":"security@open-xchange.com","published_at":"2023-08-02 13:15:00","updated_at":"2024-01-12 08:15:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html","name":"http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html","refsource":"MISC","tags":[],"title":"OX App Suite SSRF / SQL Injection / Cross Site Scripting ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json","name":"https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json","refsource":"","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json","name":"https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json","refsource":"MISC","tags":[],"title":"","mime":"application/json","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Aug/8","name":"http://seclists.org/fulldisclosure/2023/Aug/8","refsource":"MISC","tags":[],"title":"Full Disclosure: OXAS-ADV-2023-0003: OX App Suite Security Advisory","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf","name":"https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf","refsource":"MISC","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-26448","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26448","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"26448","vulnerable":"1","versionEndIncluding":"7.10.6","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"open-xchange","cpe5":"open-xchange_appsuite_frontend","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-26448","ASSIGNER":"security@open-xchange.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Custom log-in and log-out locations are used-defined as jslob but were not checked to contain malicious protocol handlers. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content for those locations to avoid redirects to malicious content. No publicly available exploits are known.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","cweId":"CWE-79"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"OX Software GmbH","product":{"product_data":[{"product_name":"OX App Suite","version":{"version_data":[{"version_affected":"<=","version_name":"0","version_value":"7.10.6-rev27"}]}}]}}]}},"references":{"reference_data":[{"url":"https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf","refsource":"MISC","name":"https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf"},{"url":"https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json","refsource":"MISC","name":"https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json"},{"url":"http://seclists.org/fulldisclosure/2023/Aug/8","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Aug/8"},{"url":"http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html","refsource":"MISC","name":"http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"defect":["OXUIB-2285"],"discovery":"INTERNAL"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-08-02 13:15:00","lastModifiedDate":"2024-01-12 08:15:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:*:*:*:*:*:*:*:*","versionEndIncluding":"7.10.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}