First published: Tue Jun 20 2023(Updated: )
Attackers can successfully request arbitrary snippet IDs, including E-Mail signatures of other users within the same context. Signatures of other users could be read even though they are not explicitly shared. We improved permission handling when requesting snippets that are not explicitly shared with other users. No publicly available exploits are known.
Credit: security@open-xchange.com security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
<7.10.6 | ||
>=8.0.0<8.11.0 | ||
=7.10.6 | ||
=7.10.6-revision_39 | ||
Open-xchange Open-xchange Appsuite Backend | <7.10.6 | |
Open-xchange Open-xchange Appsuite Backend | >=8.0.0<8.11.0 | |
Open-xchange Open-xchange Appsuite Backend | =7.10.6 | |
Open-xchange Open-xchange Appsuite Backend | =7.10.6-revision_39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-26428 is medium with a CVSS score of 6.5.
Attackers can exploit CVE-2023-26428 by successfully requesting arbitrary snippet IDs, including email signatures of other users within the same context.
The affected software for CVE-2023-26428 is Open-xchange Open-xchange Appsuite Backend with versions up to 7.10.6 and versions between 8.0.0 and 8.11.0.
To fix CVE-2023-26428, it is recommended to upgrade to a version of Open-xchange Appsuite Backend that is not affected by this vulnerability.
More information about CVE-2023-26428 can be found in the references provided: http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html, http://seclists.org/fulldisclosure/2023/Jun/8, https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json