Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.
References
| Link | Resource |
|---|---|
| https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf | Release Notes |
| http://seclists.org/fulldisclosure/2023/Aug/8 | Mailing List Third Party Advisory |
| http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
| https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json |
Configurations
Information
Published : 2023-08-02 13:15
Updated : 2024-01-12 08:15
NVD link : CVE-2023-26441
Mitre link : CVE-2023-26441
JSON object : View
Products Affected
open-xchange
- open-xchange_appsuite_office
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
