First published: Tue Jun 20 2023(Updated: )
IPv4-mapped IPv6 addresses did not get recognized as "local" by the code and a connection attempt is made. Attackers with access to user accounts could use this to bypass existing deny-list functionality and trigger requests to restricted network infrastructure to gain insight about topology and running services. We now respect possible IPV4-mapped IPv6 addresses when checking if contained in a deny-list. No publicly available exploits are known.
Credit: security@open-xchange.com security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
<7.10.6 | ||
>=8.0.0<8.11.0 | ||
=7.10.6 | ||
=7.10.6-revision_39 | ||
Open-xchange Open-xchange Appsuite Backend | <7.10.6 | |
Open-xchange Open-xchange Appsuite Backend | >=8.0.0<8.11.0 | |
Open-xchange Open-xchange Appsuite Backend | =7.10.6 | |
Open-xchange Open-xchange Appsuite Backend | =7.10.6-revision_39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-26431.
The severity of CVE-2023-26431 is medium with a CVSS score of 4.3.
Open-xchange Appsuite Backend versions up to 7.10.6 and versions 8.0.0 to 8.11.0 are affected by CVE-2023-26431.
Attackers with access to user accounts can use CVE-2023-26431 to bypass deny-list functionality and trigger requests to restricted network infrastructure to gain insight about topology and run commands.
More information about CVE-2023-26431 can be found in the following references: [Packet Storm Security](http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html), [SecLists Full Disclosure](http://seclists.org/fulldisclosure/2023/Jun/8), [Open-Xchange Documentation](https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0002.json).