First published: Thu Nov 02 2023(Updated: )
Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL statements. An attacker with access to the adjacent network and potentially API credentials, could read and modify database content which is accessible to the imageconverter SQL user account. None No publicly available exploits are known.
Credit: security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
<7.10.6 | ||
=7.10.6 | ||
=7.10.6-patch_release_6069 | ||
=7.10.6-patch_release_6073 | ||
=7.10.6-patch_release_6080 | ||
=7.10.6-patch_release_6085 | ||
=7.10.6-patch_release_6093 | ||
=7.10.6-patch_release_6102 | ||
=7.10.6-patch_release_6112 | ||
=7.10.6-patch_release_6121 | ||
=7.10.6-patch_release_6133 | ||
=7.10.6-patch_release_6138 | ||
=7.10.6-patch_release_6141 | ||
=7.10.6-patch_release_6146 | ||
=7.10.6-patch_release_6147 | ||
=7.10.6-patch_release_6148 | ||
=7.10.6-patch_release_6150 | ||
=7.10.6-patch_release_6156 | ||
=7.10.6-patch_release_6161 | ||
=7.10.6-patch_release_6166 | ||
=7.10.6-patch_release_6173 | ||
=7.10.6-patch_release_6176 | ||
=7.10.6-patch_release_6178 | ||
=7.10.6-patch_release_6189 | ||
=7.10.6-patch_release_6194 | ||
=7.10.6-patch_release_6199 | ||
=7.10.6-patch_release_6204 | ||
=7.10.6-patch_release_6205 | ||
=7.10.6-patch_release_6209 | ||
=7.10.6-patch_release_6210 | ||
=7.10.6-patch_release_6214 | ||
=7.10.6-patch_release_6215 | ||
=7.10.6-patch_release_6216 | ||
=7.10.6-patch_release_6218 | ||
=7.10.6-patch_release_6219 | ||
=7.10.6-patch_release_6220 | ||
=7.10.6-patch_release_6227 | ||
=7.10.6-patch_release_6230 | ||
=7.10.6-patch_release_6233 | ||
=7.10.6-patch_release_6235 | ||
=7.10.6-patch_release_6236 | ||
=7.10.6-patch_release_6239 | ||
=7.10.6-patch_release_6241 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-29047.
The severity of CVE-2023-29047 is high, with a CVSS score of 7.3.
The Open-xchange Open-xchange Appsuite version 7.10.6 up to but not including patch release 6243 is affected by CVE-2023-29047.
An attacker with access to the adjacent network and potentially API credentials can exploit CVE-2023-29047 by injecting arbitrary SQL statements through the Imageconverter API endpoints.
Yes, a fix for CVE-2023-29047 is available in the patch release 6243 of Open-xchange Open-xchange Appsuite.