Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.
References
Configurations
History
21 Nov 2024, 07:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.7 |
References | () http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2023/Aug/8 - Mailing List, Third Party Advisory | |
References | () https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json - | |
References | () https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf - Release Notes |
12 Jan 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2023-08-02 13:15
Updated : 2024-11-21 07:51
NVD link : CVE-2023-26441
Mitre link : CVE-2023-26441
CVE.ORG link : CVE-2023-26441
JSON object : View
Products Affected
open-xchange
- open-xchange_appsuite_office