First published: Tue Jun 20 2023(Updated: )
Control characters were not removed when exporting user feedback content. This allowed attackers to include unexpected content via user feedback and potentially break the exported data structure. We now drop all control characters that are not whitespace character during the export. No publicly available exploits are known.
Credit: security@open-xchange.com security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
<7.10.6 | ||
>=8.0.0<8.11.0 | ||
=7.10.6 | ||
=7.10.6-revision_39 | ||
Open-xchange Open-xchange Appsuite Backend | <7.10.6 | |
Open-xchange Open-xchange Appsuite Backend | >=8.0.0<8.11.0 | |
Open-xchange Open-xchange Appsuite Backend | =7.10.6 | |
Open-xchange Open-xchange Appsuite Backend | =7.10.6-revision_39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26429 is a vulnerability in Open-xchange AppSuite Backend that allowed attackers to include unexpected content via user feedback and potentially break the exported data structure.
CVE-2023-26429 has a severity rating of medium with a severity value of 5.3.
CVE-2023-26429 affects Open-xchange AppSuite Backend versions up to and including 7.10.6 and versions between 8.0.0 and 8.11.0.
To fix CVE-2023-26429, update Open-xchange AppSuite Backend to a version that is not affected by the vulnerability.
Yes, you can find references related to CVE-2023-26429 at the following links: [http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html](http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html), [http://seclists.org/fulldisclosure/2023/Jun/8](http://seclists.org/fulldisclosure/2023/Jun/8), [https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json](https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json).