First published: Mon May 06 2024(Updated: )
E-Mails exported as PDF were stored in a cache that did not consider specific session information for the related user account. Users of the same service node could access other users E-Mails in case they were exported as PDF for a brief moment until caches were cleared. Successful exploitation requires good timing and modification of multiple request parameters. Please deploy the provided updates and patch releases. The cache for PDF exports now takes user session information into consideration when performing authorization decisions. No publicly available exploits are known.
Credit: security@open-xchange.com
Affected Software | Affected Version | How to fix |
---|---|---|
Open-Xchange App Suite Backend | <8.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23193 has a severity rating classified as high due to the potential for unauthorized access to users' email data.
CVE-2024-23193 affects Open-Xchange OX App Suite versions up to 8.22.
To fix CVE-2024-23193, update your Open-Xchange OX App Suite to the latest version that addresses the cache-related vulnerabilities.
CVE-2024-23193 allows users on the same service node to potentially access other users' email PDFs if exported and cached.
No, data may not be safe as CVE-2024-23193 could lead to temporary exposure of sensitive emails to other users.