what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Open-Xchange 7.8.0 Cross Site Scripting

Open-Xchange 7.8.0 Cross Site Scripting
Posted Apr 4, 2016
Authored by Satish Bommisetty, Tim Schughart

Open-Xchange versions 7.8.0 and below suffer from multiple cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
advisories | CVE-2016-2840
SHA-256 | 5273ac97746a41370e8a7259e9ccb912428c0fe5e29b9545c0ae6f750da37d5f

Open-Xchange 7.8.0 Cross Site Scripting

Change Mirror Download
Product: Open-Xchange Server 6 / OX AppSuite
Vendor: Open-Xchange GmbH

Internal reference: 44409 (Bug ID)
Vulnerability type: Cross Site Scripting (CWE-80)
Vulnerable version: 7.8.0 and earlier
Vulnerable component: backend
Report confidence: Confirmed
Solution status: Fixed by Vendor
Fixed versions: 7.6.2-rev50, 7.6.3-rev8, 7.8.0-rev26
Researcher credits: Tim Schughart of ProSec Networks
Vendor notification: 2016-03-02
Solution date: 2016-03-14
Public disclosure: 2016-04-02
CVE reference: CVE-2016-2840
CVSSv2: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

Vulnerability Details:
The "session" parameter for file-download requests can be used to inject script code that gets reflected through the subsequent status page.

Risk:
Malicious script code can be executed within a trusted domains context. While no OX App Suite specific data can be manipulated, the vulnerability can be exploited without being authenticated and therefor used for social engineering attacks, stealing cookies or redirecting from trustworthy to malicious hosts.

Steps to reproduce:
Construct a HTTP GET request to the /api/mail servlet and "attachment" action that contains script code at the "session" parameter. The same applies to the /api/files servlet when requesting a HTML file. Since the session is not known to the system, a error page will be returned. This page reflects the provided value for the "session" parameter and browsers may execute embedded script code.

Solution:
Users should not open links from untrusted sources. Providers should update to the last publicly available Patch Releases (7.6.2-rev50, 7.6.3-rev8, 7.8.0-rev26) or later.



Internal reference: 44542 (Bug ID)
Vulnerability type: Cross Site Scripting (CWE-80)
Vulnerable version: 7.8.0 and earlier
Vulnerable component: frontend
Report confidence: Confirmed
Solution status: Fixed by Vendor
Fixed versions: 7.6.2-rev40, 7.6.3-rev7, 7.8.0-rev19
Researcher credits: Satish Bommisetty
Vendor notification: 2016-03-07
Solution date: 2016-03-14
Public disclosure: 2016-04-02
CVSSv3: 3.7 (AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N/RC:C)

Vulnerability Details:
App Suite Portal can be used to display files stored at OX Drive. In case a user has added a file to the portal where the file-name contains script code, it may get executed. Exploiting this vulnerability requires additional social-engineering steps. Malicious file-names can be distributed to other users by sharing a file or renaming a shared file which has already been added to the portal.

Risk:
Malicious script code can be executed within a users context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

Steps to reproduce:
1. Create a file named "><img src=x onerror=alert(1)>.xlsx
2. Share the file to another user
3. Trick another user to add this file to the portal by using "Add to Portal" in Drive

Solution:
Users should not accept data and usage instructions from untrusted sources. Providers should update to the last publicly available Patch Releases (7.6.2-rev40, 7.6.3-rev7, 7.8.0-rev19) or later.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close