User-defined OXMF templates could be used to access a limited part of the internal OX App Suite Java API. The existing switch to disable the feature by default was not effective in this case. Unauthorized users could discover and modify application state, including objects related to other users and contexts. We now make sure that the switch to disable user-generated templates by default works as intended and will remove the feature in future generations of the product. No publicly available exploits are known.
Max CVSS
8.1
EPSS Score
0.05%
Published
2024-01-08
Updated
2024-01-22
The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.
Max CVSS
9.6
EPSS Score
0.10%
Published
2024-01-08
Updated
2024-01-12
A component for parsing OXMF templates could be abused to execute arbitrary system commands that would be executed as the non-privileged runtime user. Users and attackers could run system commands with limited privilege to gain unauthorized access to confidential information and potentially violate integrity by modifying resources. The template engine has been reconfigured to deny execution of harmful commands on a system level. No publicly available exploits are known.
Max CVSS
8.8
EPSS Score
0.09%
Published
2024-01-08
Updated
2024-01-12
Requests to fetch image metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.
Max CVSS
8.8
EPSS Score
0.05%
Published
2023-11-02
Updated
2024-01-12
Requests to cache an image could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.
Max CVSS
8.8
EPSS Score
0.05%
Published
2023-11-02
Updated
2024-01-12
Requests to cache an image and return its metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.
Max CVSS
8.8
EPSS Score
0.05%
Published
2023-11-02
Updated
2024-01-12
Full-text autocomplete search allows user-provided SQL syntax to be injected to SQL statements. With existing sanitization in place, this can be abused to trigger benign SQL Exceptions but could potentially be escalated to a malicious SQL injection vulnerability. We now properly encode single quotes for SQL FULLTEXT queries. No publicly available exploits are known.
Max CVSS
9.8
EPSS Score
0.12%
Published
2023-08-02
Updated
2024-01-12
Attackers with access to the "documentconverterws" API were able to inject serialized Java objects, that were not properly checked during deserialization. Access to this API endpoint is restricted to local networks by default. Arbitrary code could be injected that is being executed when processing the request. A check has been introduced to restrict processing of legal and expected classes for this API. We now log a warning in case there are attempts to inject illegal classes. No publicly available exploits are known.
Max CVSS
8.8
EPSS Score
0.06%
Published
2023-06-20
Updated
2024-01-12
documentconverter in OX App Suite through 7.10.6, in a non-default configuration with ghostscript, allows OS Command Injection because file conversion may occur for an EPS document that is disguised as a PDF document.
Max CVSS
9.8
EPSS Score
0.17%
Published
2022-10-25
Updated
2022-10-26
OX App Suite through 7.10.6 allows OS Command Injection via a serialized Java class to the Documentconverter API.
Max CVSS
9.8
EPSS Score
0.34%
Published
2022-07-27
Updated
2022-08-03
OX App Suite through 7.10.6 allows OS Command Injection via Documentconverter (e.g., through an email attachment).
Max CVSS
9.8
EPSS Score
0.34%
Published
2022-07-27
Updated
2022-08-03
OX App Suite 7.10.1 to 7.10.3 has improper input validation for rate limits with a crafted User-Agent header, spoofed vacation notices, and /apps/load memory consumption.
Max CVSS
9.8
EPSS Score
0.24%
Published
2020-08-31
Updated
2021-07-21
OX App Suite through 7.10.2 has Incorrect Access Control.
Max CVSS
8.5
EPSS Score
1.10%
Published
2020-01-06
Updated
2020-01-15
OX App Suite through 7.10.2 has Insecure Permissions.
Max CVSS
8.1
EPSS Score
0.09%
Published
2019-10-14
Updated
2019-10-17
OX App Suite 7.10.1 allows Content Spoofing.
Max CVSS
8.1
EPSS Score
0.14%
Published
2019-08-20
Updated
2020-08-24
OX App Suite 7.10.0 and earlier has Incorrect Access Control.
Max CVSS
9.8
EPSS Score
0.26%
Published
2019-06-17
Updated
2020-08-24
OX Guard 2.8.0 has CSRF.
Max CVSS
8.8
EPSS Score
0.07%
Published
2019-07-03
Updated
2019-07-05
The backend component in Open-Xchange OX App Suite before 7.6.3-rev36, 7.8.x before 7.8.2-rev39, 7.8.3 before 7.8.3-rev44, and 7.8.4 before 7.8.4-rev22 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors involving non-decimal representations of IP addresses and special IPv6 related addresses.
Max CVSS
8.8
EPSS Score
0.78%
Published
2018-06-16
Updated
2018-08-03
OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Insecure Permissions.
Max CVSS
9.8
EPSS Score
0.27%
Published
2019-05-23
Updated
2019-05-23
OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: SSRF.
Max CVSS
9.9
EPSS Score
0.11%
Published
2019-05-23
Updated
2019-05-28
Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control.
Max CVSS
8.8
EPSS Score
0.21%
Published
2019-05-22
Updated
2019-05-23
Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control.
Max CVSS
8.8
EPSS Score
0.21%
Published
2019-05-22
Updated
2019-05-23
Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control.
Max CVSS
9.8
EPSS Score
0.44%
Published
2019-05-22
Updated
2019-05-23
Open-Xchange GmbH OX App Suite 7.8.3 is affected by: Incorrect Access Control.
Max CVSS
9.8
EPSS Score
0.38%
Published
2019-05-23
Updated
2019-05-23
Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Information Exposure.
Max CVSS
9.8
EPSS Score
0.27%
Published
2019-05-23
Updated
2019-05-23
26 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!