First published: Thu Nov 02 2023(Updated: )
Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known.
Credit: security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
<2.10.7 | ||
=2.10.7 | ||
=2.10.7-rev4 | ||
=2.10.7-rev5 | ||
=2.10.7-rev6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26456 is a vulnerability that allows for indirect cross-site scripting attacks in Open-Xchange OX Guard.
CVE-2023-26456 has a severity rating of medium with a CVSS score of 5.4.
CVE-2023-26456 affects Open-Xchange OX Guard versions up to and including 2.10.7.
CVE-2023-26456 can be exploited by setting an arbitrary product name in OX Guard, which is not properly sanitized, allowing for indirect cross-site scripting attacks.
Yes, a patch is available for CVE-2023-26456. Please refer to the Open-Xchange documentation and release notes for more information.