Vulnerability Details : CVE-2020-8544
OX App Suite through 7.10.3 allows SSRF.
Vulnerability category: Server-side request forgery (SSRF)
Products affected by CVE-2020-8544
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev16:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev14:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev6:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev4:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev11:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev10:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev9:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev8:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev18:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev17:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev3:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev15:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev13:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev7:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev5:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev20:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev19:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev21:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev23:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev24:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev25:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev26:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev27:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev22:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev1:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev2:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev3:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev4:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev5:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev1:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev2:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev3:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev4:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.3:rev1:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.3:rev2:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.3:rev3:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.3:rev4:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev1:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev12:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev2:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev28:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev29:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev30:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev31:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev32:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev33:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev34:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev35:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev36:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev37:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev38:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev39:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev40:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev41:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev42:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev43:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev44:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev45:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev46:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev47:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev48:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev49:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev50:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev51:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev52:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev53:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev54:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev55:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev56:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev57:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev58:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev59:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev60:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev61:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev62:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev63:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev64:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev65:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev66:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.8.4:rev67:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev10:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev11:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev12:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev13:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev14:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev15:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev16:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev17:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev18:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev19:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev20:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev21:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev22:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev23:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev24:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev25:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev26:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev27:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev6:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev7:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev8:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.1:rev9:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev10:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev11:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev12:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev13:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev14:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev15:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev16:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev17:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev18:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev19:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev20:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev21:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev5:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev6:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev7:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev8:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:rev9:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.3:rev5:*:*:*:*:*:*
- cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.3:rev6:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-8544
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-8544
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2020-8544
-
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-8544
-
https://packetstormsecurity.com/files/158070/OX-App-Suite-OX-Documents-7.10.3-XSS-SSRF-Improper-Validation.html
OX App Suite / OX Documents 7.10.3 XSS / SSRF / Improper Validation ≈ Packet StormThird Party Advisory;VDB Entry
-
https://www.open-xchange.com/
Home | Open-XchangeProduct
Jump to