First published: Thu Dec 15 2016(Updated: )
An issue was discovered in Open-Xchange OX Guard before 2.4.2-rev5. Script code which got injected to a mail with inline PGP signature gets executed when verifying the signature. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open-Xchange OX Guard | <=2.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6854 is considered a medium severity vulnerability due to the potential for session hijacking.
To fix CVE-2016-6854, upgrade Open-Xchange OX Guard to version 2.4.2-rev5 or later.
CVE-2016-6854 can lead to the execution of malicious scripts in a user's context, posing risks such as session hijacking.
CVE-2016-6854 is exploitable in versions of Open-Xchange OX Guard prior to 2.4.2-rev5.
The consequences of CVE-2016-6854 include unauthorized access, data theft, and compromise of user sessions.