First published: Wed Aug 02 2023(Updated: )
Custom log-in and log-out locations are used-defined as jslob but were not checked to contain malicious protocol handlers. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content for those locations to avoid redirects to malicious content. No publicly available exploits are known.
Credit: security@open-xchange.com security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=7.10.6 | ||
Open-xchange Open-xchange Appsuite Frontend | <=7.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26448 is a vulnerability in Open-xchange Appsuite Frontend that allows malicious script code to be executed within the victim's context, leading to session hijacking or triggering unwanted actions via the web interface and API.
CVE-2023-26448 has a severity rating of 5.4, which is classified as medium.
Open-xchange Appsuite Frontend versions up to and including 7.10.6 are affected by CVE-2023-26448.
CVE-2023-26448 can be exploited by using custom log-in and log-out locations with malicious protocol handlers to execute script code within the victim's context.
Yes, a patch release (6230_7.10.6) is available to address the vulnerability in Open-xchange Appsuite Frontend.