First published: Wed Aug 02 2023(Updated: )
The users clientID at "application passwords" was not sanitized or escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the user-controllable clientID parameter. No publicly available exploits are known.
Credit: security@open-xchange.com security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=7.10.6 | ||
>=8.10<8.12 | ||
Open-xchange Open-xchange Appsuite Frontend | <=7.10.6 | |
Open-xchange Open-xchange Appsuite Frontend | >=8.10<8.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26446 is a vulnerability in Open-xchange Appsuite Frontend that allows malicious script code to be executed within the victim's context, leading to session hijacking or triggering unwanted actions via the web interface and API.
Open-xchange Appsuite Frontend versions up to and including 7.10.6 and versions between 8.10 and 8.12 are affected by CVE-2023-26446.
CVE-2023-26446 has a severity score of 5.4, which is considered medium.
To exploit CVE-2023-26446, an attacker would need to inject malicious script code into the victim's clientID at 'application passwords' in Open-xchange Appsuite Frontend.
To mitigate CVE-2023-26446, it is recommended to update Open-xchange Appsuite Frontend to a version that includes the necessary security patches.