Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Aug/8 | Mailing List Third Party Advisory |
https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json | |
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf | Release Notes |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: OX
Published: 2023-08-02T12:23:09.844Z
Updated: 2024-01-12T07:12:52.505Z
Reserved: 2023-02-22T20:42:56.090Z
Link: CVE-2023-26441
JSON object: View
NVD Information
Status : Modified
Published: 2023-08-02T13:15:10.563
Modified: 2024-01-12T08:15:41.510
Link: CVE-2023-26441
JSON object: View
Redhat Information
No data.