The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.
References
| Link | Resource |
|---|---|
| https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6248_7.10.6_2023-09-19.pdf | Release Notes |
| http://seclists.org/fulldisclosure/2024/Jan/3 | Mailing List Third Party Advisory |
| http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html | Third Party Advisory VDB Entry |
| https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0005.json | Issue Tracking |
Configurations
Configuration 1 (hide)
|
Information
Published : 2024-01-08 09:15
Updated : 2024-01-12 14:24
NVD link : CVE-2023-29050
Mitre link : CVE-2023-29050
JSON object : View
Products Affected
open-xchange
- ox_app_suite
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
