The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2024/Jan/3 | Mailing List Third Party Advisory |
https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0005.json | Issue Tracking |
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6248_7.10.6_2023-09-19.pdf | Release Notes |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: OX
Published: 2024-01-08T08:51:40.489Z
Updated: 2024-01-12T07:07:02.708Z
Reserved: 2023-03-30T09:34:25.189Z
Link: CVE-2023-29050
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-08T09:15:20.300
Modified: 2024-01-12T14:24:21.330
Link: CVE-2023-29050
JSON object: View
Redhat Information
No data.