User-defined script code could be stored for a upsell related shop URL. This code was not correctly sanitized when adding it to DOM. Attackers could lure victims to user accounts with malicious script code and make them execute it in the context of a trusted domain. We added sanitization for this content. No publicly available exploits are known.
References
| Link | Resource |
|---|---|
| https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6251_7.10.6_2023-09-25.pdf | Release Notes |
| http://seclists.org/fulldisclosure/2024/Jan/4 | Mailing List Third Party Advisory |
| http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
| https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0006.json | Issue Tracking |
Configurations
Configuration 1 (hide)
|
Information
Published : 2024-01-08 09:15
Updated : 2024-01-12 13:56
NVD link : CVE-2023-41710
Mitre link : CVE-2023-41710
JSON object : View
Products Affected
open-xchange
- ox_app_suite
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
