First published: Wed Aug 02 2023(Updated: )
Full-text autocomplete search allows user-provided SQL syntax to be injected to SQL statements. With existing sanitization in place, this can be abused to trigger benign SQL Exceptions but could potentially be escalated to a malicious SQL injection vulnerability. We now properly encode single quotes for SQL FULLTEXT queries. No publicly available exploits are known.
Credit: security@open-xchange.com security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
Open-Xchange App Suite Backend | <=7.10.6 | |
Open-Xchange App Suite Backend | >=8.10.0<=8.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26443 is a vulnerability in the full-text autocomplete search feature of Open-xchange Appsuite Backend that allows injection of user-provided SQL syntax, which can potentially lead to a malicious SQL injection attack.
CVE-2023-26443 has a severity rating of critical with a CVSS score of 9.8.
CVE-2023-26443 affects Open-xchange Appsuite Backend versions up to and including 7.10.6, as well as versions between 8.10.0 and 8.12.
CVE-2023-26443 can be exploited by injecting user-provided SQL syntax into SQL statements used by the full-text autocomplete search feature.
To fix CVE-2023-26443, it is recommended to update to a patched version of Open-xchange Appsuite Backend and ensure that proper sanitization of user input is implemented.