[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Open-Xchange Security Advisory 2014-09-15



Product: OX App Suite
Vendor: Open-Xchange GmbH


Vulnerability type: Cross Site Scripting (CWE-80)
Vulnerable version: 7.6.0 and earlier
Vulnerable component: frontend
Fixed version: 7.4.2-rev33, 7.6.0-rev16
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2014-07-19
Solution date: 2014-08-26
Public disclosure: 2013-09-15
CVE reference: CVE-2014-5235
OX bug reference: 33620
CVSSv2: 5.7 (AV:N/AC:M/Au:N/C:P/I:N/A:N/E:POC/RL:U/RC:C/CDP:LM/TD:H/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
CDATA encapsulated script code within certain fields of a RSS feeds gets executed by the frontend.

Risk:
Malicious script code can be executed within a users context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

Solution:
RSS feeds now get sanitized more carefully. Users should update to the latest patch releases. Users should avoid integrating untrusted or suspicious RSS feeds.



Vulnerability type: Absolute Path Traversal (CWE-36)
Vulnerable version: 7.6.0 and earlier
Vulnerable component: documentconverter
Fixed version: 7.4.2-rev10, 7.6.0-rev10
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2014-07-31
Solution date: 2014-08-26
Public disclosure: 2013-09-15
CVE reference: CVE-2014-5236
OX bug reference: 33834
Credits: Patrick Hof, Till Maas and Benjamin Grap of RedTeam Pentesting
CVSSv2: 7.4 (AV:N/AC:M/Au:S/C:C/I:N/A:N/E:P/RL:U/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
Crafted OLE Objects within OpenDocument Text files can be used to reference objects with absolute or relative paths. By using further modifications to the documents XML structure, existing security functions of the LibreOffice backend get bypassed. As a result, the referenced file gets included from the servers file system.

Risk:
Attackers may read configuration files located at the server where documentconverter is deployed. Since documentconverter runs with reduced permissions, this is valid for all files that can be read by the user group "open-xchange".

Solution:
A black- and whitelist has been introduced to control file access. Users should update to the latest patch releases.



Vulnerability type: Absolute Path Traversal (CWE-36)
Vulnerable version: 7.6.0 and earlier
Vulnerable component: documentconverter
Fixed version: 7.4.2-rev10, 7.6.0-rev10
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2014-07-31
Solution date: 2014-08-26
Public disclosure: 2013-09-15
CVE reference: CVE-2014-5236
OX bug reference: 33835
Credits: Patrick Hof, Till Maas and Benjamin Grap of RedTeam Pentesting
CVSSv2: 7.4 (AV:N/AC:M/Au:S/C:C/I:N/A:N/E:P/RL:U/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
Crafted images within OpenDocument Text files can be used to reference objects with absolute or relative paths. As a result, the referenced file gets included from the servers file system.

Risk:
If an attacker knows the correct path to image files at the server where documentconverter is deployed, those can be made available to the attacker. Usually no security-related images are stored within deployments. Content of the OX Drive storage could be referenced but since the storage is separated to context- and user-bucket specific, hashed paths, it's unlikely for an attacker to successfully referencing such files. Including many files may pose a risk of denial-of-service attacks, though.

Solution:
A black- and whitelist has been introduced to control file access. Users should update to the latest patch releases.



Vulnerability type: Server-Side Request Forgery (CWE-918)
Vulnerable version: 7.6.0 and earlier
Vulnerable component: documentconverter
Fixed version: 7.4.2-rev10, 7.6.0-rev10
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2014-07-31
Solution date: 2014-08-26
Public disclosure: 2013-09-15
CVE reference: CVE-2014-5237
OX bug reference: 33836
Credits: Patrick Hof, Till Maas and Benjamin Grap of RedTeam Pentesting
CVSSv2: 4.4 (AV:N/AC:L/Au:M/C:P/I:N/A:N/E:F/RL:U/RC:C/CDP:MH/TD:M/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
Text documents allow embedding remote images, based on URLs provided by the document creator. When editing such a document within OX Text, the image gets requested by the users client, which is fine. However, when rendering previews of such images, the file gets requested by the server, introducing a SSRF attack vector.

Risk:
Malicious documents could be used to fetch lots of images from a specific host, leading to denial-of-service attacks. Also, content may get fetched from legally questionable sources, potentially putting the operator of the documentconverter into legal trouble.

Solution:
Outbound traffic of a documentconverter deployment should be controlled on a network level, if an operator does not wish to let users include external resources and use them when generating document previews. Users should update to the latest patch releases. A new black- and whitelist has been introduced to control access to remote resources.



Vulnerability type: Improper Restriction of Recursive Entity References in DTDs (CWE-776)
Vulnerable version: 7.6.0 and earlier
Vulnerable component: office
Fixed version: 7.4.2-rev11, 7.6.0-rev9
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2014-07-31
Solution date: 2014-08-26
Public disclosure: 2013-09-15
CVE reference: CVE-2014-5238
OX bug reference: 33838
Credits: Patrick Hof, Till Maas and Benjamin Grap of RedTeam Pentesting
CVSSv2: 7.4 (AV:N/AC:M/Au:S/C:C/I:N/A:N/E:P/RL:U/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
Since OpenDocument Text documents are XML files, external entities may get included to these files. The XML parser tries to resolve these external entities by expanding them (XEE), for example including files or running specific XML parser functions. There are several attack vectors, for example including local files from the OX Text deployment or creating malicious documents that use exponential entity expansion (XEEE). Such exponential entities can be used to create huge documents based on very few lines of XML code.

Risk:
By using an XEE attack, introducing the XML "SYSTEM" entity and absolute or relative paths, the referenced file gets included from the servers file system. As a result, the whole file is visible at the OX Text editor. XEEE attacks can be used to run denial-of-service attacks to the deployment by creating vastly complex XML files that take a lot of time to process.

Solution:
DOCTYPE within ODT files is now forbidden and therefor external or special entities cannot get included anymore. Users should update to the latest patch releases.



Vulnerability type: Cross Site Scripting (CWE-80)
Vulnerable version: 7.6.0 and earlier
Vulnerable component: backend
Fixed version: 7.4.2-rev33, 7.6.0-rev16
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2014-07-31
Solution date: 2014-08-26
Public disclosure: 2013-09-15
CVE reference: CVE-2014-5234
OX bug reference: 33839
Credits: Patrick Hof, Till Maas and Benjamin Grap of RedTeam Pentesting
CVSSv2: 5.7 (AV:N/AC:M/Au:N/C:P/I:N/A:N/E:POC/RL:U/RC:C/CDP:LM/TD:H/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
Arbitrary script code can be used as folder publication name, leading to code execution at clients that display such publications.

Risk:
Malicious script code can be executed within a users context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

Solution:
Publications now get sanitized more carefully. Users should update to the latest patch releases.