8.8

CVE-2023-26453

Requests to cache an image could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.

Data is provided by the National Vulnerability Database (NVD)
Open-xchangeOpen-xchange Appsuite Version < 7.10.6
Open-xchangeOpen-xchange Appsuite Version7.10.6 Update-
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6069
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6073
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6080
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6085
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6093
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6102
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6112
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6121
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6133
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6138
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6141
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6146
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6147
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6148
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6150
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6156
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6161
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6166
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6173
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6176
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6178
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6189
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6194
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6199
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6204
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6205
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6209
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6210
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6214
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6215
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6216
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6218
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6219
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6220
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6227
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6230
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6233
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6235
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6236
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6239
Open-xchangeOpen-xchange Appsuite Version7.10.6 Updatepatch_release_6241
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.17
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
security@open-xchange.com 7.6 0.9 6
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.