An issue was discovered in Open-Xchange Server 6 / OX AppSuite before 7.8.0-rev26. The "session" parameter for file-download requests can be used to inject script code that gets reflected through the subsequent status page. Malicious script code can be executed within a trusted domain's context. While no OX App Suite specific data can be manipulated, the vulnerability can be exploited without being authenticated and therefore used for social engineering attacks, stealing cookies or redirecting from trustworthy to malicious hosts.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/136543/Open-Xchange-7.8.0-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/537959/100/0/threaded | |
http://www.securitytracker.com/id/1035469 | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2016-12-15T06:31:00
Updated: 2018-10-19T14:57:01
Reserved: 2016-03-02T00:00:00
Link: CVE-2016-2840
JSON object: View
NVD Information
Status : Modified
Published: 2016-12-15T06:59:01.113
Modified: 2018-10-19T15:46:29.913
Link: CVE-2016-2840
JSON object: View
Redhat Information
No data.
CWE