First published: Thu Oct 03 2013(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange AppSuite before 7.2.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) content with the text/xml MIME type or (2) the Status comment field of an appointment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open-Xchange App Suite Backend | <=7.2.1 | |
Open-Xchange App Suite Backend | =6.20.7 | |
Open-Xchange App Suite Backend | =6.22.0 | |
Open-Xchange App Suite Backend | =6.22.1 | |
Open-Xchange App Suite Backend | =7.0.1 | |
Open-Xchange App Suite Backend | =7.0.2 | |
Open-Xchange App Suite Backend | =7.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5690 is classified as a medium severity vulnerability due to the potential for XSS attacks.
To fix CVE-2013-5690, upgrade Open-Xchange AppSuite to version 7.2.2 or later.
CVE-2013-5690 affects Open-Xchange AppSuite versions up to 7.2.1 and some specific 6.x and 7.x versions.
CVE-2013-5690 can lead to remote code execution and session hijacking through XSS vulnerabilities.
The vulnerabilities in CVE-2013-5690 involve the text/xml MIME type content and the Status comment field of appointments.