An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Setting the user's name to JS code makes that code execute when selecting that user's "Templates" folder from OX Documents settings. This requires the folder to be shared to the victim. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93457 | Third Party Advisory VDB Entry |
https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3522_7.8.2_2016-08-29.pdf | Release Notes Vendor Advisory |
Configurations
Information
Published : 2016-12-14 22:59
Updated : 2016-12-16 10:41
NVD link : CVE-2016-6842
Mitre link : CVE-2016-6842
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
open-xchange
- open-xchange_appsuite