Product: Open-Xchange Server 6 / OX AppSuite Vendor: Open-Xchange GmbH Internal reference: 44409 (Bug ID) Vulnerability type: Cross Site Scripting (CWE-80) Vulnerable version: 7.8.0 and earlier Vulnerable component: backend Report confidence: Confirmed Solution status: Fixed by Vendor Fixed versions: 7.6.2-rev50, 7.6.3-rev8, 7.8.0-rev26 Researcher credits: Tim Schughart of ProSec Networks Vendor notification: 2016-03-02 Solution date: 2016-03-14 Public disclosure: 2016-04-02 CVE reference: CVE-2016-2840 CVSSv2: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N) Vulnerability Details: The "session" parameter for file-download requests can be used to inject script code that gets reflected through the subsequent status page. Risk: Malicious script code can be executed within a trusted domains context. While no OX App Suite specific data can be manipulated, the vulnerability can be exploited without being authenticated and therefor used for social engineering attacks, stealing cookies or redirecting from trustworthy to malicious hosts. Steps to reproduce: Construct a HTTP GET request to the /api/mail servlet and "attachment" action that contains script code at the "session" parameter. The same applies to the /api/files servlet when requesting a HTML file. Since the session is not known to the system, a error page will be returned. This page reflects the provided value for the "session" parameter and browsers may execute embedded script code. Solution: Users should not open links from untrusted sources. Providers should update to the last publicly available Patch Releases (7.6.2-rev50, 7.6.3-rev8, 7.8.0-rev26) or later. Internal reference: 44542 (Bug ID) Vulnerability type: Cross Site Scripting (CWE-80) Vulnerable version: 7.8.0 and earlier Vulnerable component: frontend Report confidence: Confirmed Solution status: Fixed by Vendor Fixed versions: 7.6.2-rev40, 7.6.3-rev7, 7.8.0-rev19 Researcher credits: Satish Bommisetty Vendor notification: 2016-03-07 Solution date: 2016-03-14 Public disclosure: 2016-04-02 CVSSv3: 3.7 (AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N/RC:C) Vulnerability Details: App Suite Portal can be used to display files stored at OX Drive. In case a user has added a file to the portal where the file-name contains script code, it may get executed. Exploiting this vulnerability requires additional social-engineering steps. Malicious file-names can be distributed to other users by sharing a file or renaming a shared file which has already been added to the portal. Risk: Malicious script code can be executed within a users context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.). Steps to reproduce: 1. Create a file named "><img src=x onerror=alert(1)>.xlsx 2. Share the file to another user 3. Trick another user to add this file to the portal by using "Add to Portal" in Drive Solution: Users should not accept data and usage instructions from untrusted sources. Providers should update to the last publicly available Patch Releases (7.6.2-rev40, 7.6.3-rev7, 7.8.0-rev19) or later.
Description: PGP signature