5.4
CVE-2023-26456
- EPSS 0.16%
- Published 02.11.2023 14:15:10
- Last modified 21.11.2024 07:51:30
- Source security@open-xchange.com
- Teams watchlist Login
- Open Login
Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known.
Data is provided by the National Vulnerability Database (NVD)
Open-xchange ≫ Ox Guard Version < 2.10.7
Open-xchange ≫ Ox Guard Version2.10.7 Update-
Open-xchange ≫ Ox Guard Version2.10.7 Updaterev4
Open-xchange ≫ Ox Guard Version2.10.7 Updaterev5
Open-xchange ≫ Ox Guard Version2.10.7 Updaterev6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.16% | 0.378 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
security@open-xchange.com | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.