First published: Thu Dec 15 2016(Updated: )
An issue was discovered in Open-Xchange Server 6 / OX AppSuite before 7.8.0-rev26. The "session" parameter for file-download requests can be used to inject script code that gets reflected through the subsequent status page. Malicious script code can be executed within a trusted domain's context. While no OX App Suite specific data can be manipulated, the vulnerability can be exploited without being authenticated and therefore used for social engineering attacks, stealing cookies or redirecting from trustworthy to malicious hosts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open-Xchange App Suite Backend | <=7.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2840 is classified as a medium severity vulnerability due to its potential for reflected cross-site scripting (XSS) attacks.
To fix CVE-2016-2840, upgrade Open-Xchange Server 6 / OX AppSuite to version 7.8.0-rev26 or later.
CVE-2016-2840 is a reflected cross-site scripting (XSS) vulnerability.
Open-Xchange Server 6 / OX AppSuite versions before 7.8.0-rev26 are affected by CVE-2016-2840.
Attackers can inject and execute malicious script code within the context of a trusted domain using CVE-2016-2840.